#[non_exhaustive]pub enum EncryptionAlgorithmSpec {
RsaesOaepSha1,
RsaesOaepSha256,
Sm2Pke,
SymmetricDefault,
Unknown(UnknownVariantValue),
}
Expand description
When writing a match expression against EncryptionAlgorithmSpec
, it is important to ensure
your code is forward-compatible. That is, if a match arm handles a case for a
feature that is supported by the service but has not been represented as an enum
variant in a current version of SDK, your code should continue to work when you
upgrade SDK to a future version in which the enum does include a variant for that
feature.
Here is an example of how you can make a match expression forward-compatible:
# let encryptionalgorithmspec = unimplemented!();
match encryptionalgorithmspec {
EncryptionAlgorithmSpec::RsaesOaepSha1 => { /* ... */ },
EncryptionAlgorithmSpec::RsaesOaepSha256 => { /* ... */ },
EncryptionAlgorithmSpec::Sm2Pke => { /* ... */ },
EncryptionAlgorithmSpec::SymmetricDefault => { /* ... */ },
other @ _ if other.as_str() == "NewFeature" => { /* handles a case for `NewFeature` */ },
_ => { /* ... */ },
}
The above code demonstrates that when encryptionalgorithmspec
represents
NewFeature
, the execution path will lead to the second last match arm,
even though the enum does not contain a variant EncryptionAlgorithmSpec::NewFeature
in the current version of SDK. The reason is that the variable other
,
created by the @
operator, is bound to
EncryptionAlgorithmSpec::Unknown(UnknownVariantValue("NewFeature".to_owned()))
and calling as_str
on it yields "NewFeature"
.
This match expression is forward-compatible when executed with a newer
version of SDK where the variant EncryptionAlgorithmSpec::NewFeature
is defined.
Specifically, when encryptionalgorithmspec
represents NewFeature
,
the execution path will hit the second last match arm as before by virtue of
calling as_str
on EncryptionAlgorithmSpec::NewFeature
also yielding "NewFeature"
.
Explicitly matching on the Unknown
variant should
be avoided for two reasons:
- The inner data
UnknownVariantValue
is opaque, and no further information can be extracted. - It might inadvertently shadow other intended match arms.
Variants (Non-exhaustive)§
This enum is marked as non-exhaustive
RsaesOaepSha1
RsaesOaepSha256
Sm2Pke
SymmetricDefault
Unknown(UnknownVariantValue)
Unknown
. See the docs on this enum for the correct way to handle unknown variants.Unknown
contains new variants that have been added since this code was generated.
Implementations§
source§impl EncryptionAlgorithmSpec
impl EncryptionAlgorithmSpec
sourcepub fn try_parse(value: &str) -> Result<Self, UnknownVariantError>
pub fn try_parse(value: &str) -> Result<Self, UnknownVariantError>
Parses the enum value while disallowing unknown variants.
Unknown variants will result in an error.
Trait Implementations§
source§impl AsRef<str> for EncryptionAlgorithmSpec
impl AsRef<str> for EncryptionAlgorithmSpec
source§impl Clone for EncryptionAlgorithmSpec
impl Clone for EncryptionAlgorithmSpec
source§fn clone(&self) -> EncryptionAlgorithmSpec
fn clone(&self) -> EncryptionAlgorithmSpec
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for EncryptionAlgorithmSpec
impl Debug for EncryptionAlgorithmSpec
source§impl Display for EncryptionAlgorithmSpec
impl Display for EncryptionAlgorithmSpec
source§impl From<&str> for EncryptionAlgorithmSpec
impl From<&str> for EncryptionAlgorithmSpec
source§impl FromStr for EncryptionAlgorithmSpec
impl FromStr for EncryptionAlgorithmSpec
source§impl Hash for EncryptionAlgorithmSpec
impl Hash for EncryptionAlgorithmSpec
source§impl Ord for EncryptionAlgorithmSpec
impl Ord for EncryptionAlgorithmSpec
source§fn cmp(&self, other: &EncryptionAlgorithmSpec) -> Ordering
fn cmp(&self, other: &EncryptionAlgorithmSpec) -> Ordering
1.21.0 · source§fn max(self, other: Self) -> Selfwhere
Self: Sized,
fn max(self, other: Self) -> Selfwhere
Self: Sized,
source§impl PartialEq for EncryptionAlgorithmSpec
impl PartialEq for EncryptionAlgorithmSpec
source§fn eq(&self, other: &EncryptionAlgorithmSpec) -> bool
fn eq(&self, other: &EncryptionAlgorithmSpec) -> bool
self
and other
values to be equal, and is used
by ==
.source§impl PartialOrd for EncryptionAlgorithmSpec
impl PartialOrd for EncryptionAlgorithmSpec
source§fn partial_cmp(&self, other: &EncryptionAlgorithmSpec) -> Option<Ordering>
fn partial_cmp(&self, other: &EncryptionAlgorithmSpec) -> Option<Ordering>
1.0.0 · source§fn le(&self, other: &Rhs) -> bool
fn le(&self, other: &Rhs) -> bool
self
and other
) and is used by the <=
operator. Read moreimpl Eq for EncryptionAlgorithmSpec
impl StructuralPartialEq for EncryptionAlgorithmSpec
Auto Trait Implementations§
impl Freeze for EncryptionAlgorithmSpec
impl RefUnwindSafe for EncryptionAlgorithmSpec
impl Send for EncryptionAlgorithmSpec
impl Sync for EncryptionAlgorithmSpec
impl Unpin for EncryptionAlgorithmSpec
impl UnwindSafe for EncryptionAlgorithmSpec
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<Q, K> Comparable<K> for Q
impl<Q, K> Comparable<K> for Q
source§impl<Q, K> Equivalent<K> for Q
impl<Q, K> Equivalent<K> for Q
source§impl<Q, K> Equivalent<K> for Q
impl<Q, K> Equivalent<K> for Q
source§fn equivalent(&self, key: &K) -> bool
fn equivalent(&self, key: &K) -> bool
key
and return true
if they are equal.