aws_sdk_kms/operation/
encrypt.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2/// Orchestration and serialization glue logic for `Encrypt`.
3#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
4#[non_exhaustive]
5pub struct Encrypt;
6impl Encrypt {
7    /// Creates a new `Encrypt`
8    pub fn new() -> Self {
9        Self
10    }
11    pub(crate) async fn orchestrate(
12        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
13        input: crate::operation::encrypt::EncryptInput,
14    ) -> ::std::result::Result<
15        crate::operation::encrypt::EncryptOutput,
16        ::aws_smithy_runtime_api::client::result::SdkError<
17            crate::operation::encrypt::EncryptError,
18            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
19        >,
20    > {
21        let map_err =
22            |err: ::aws_smithy_runtime_api::client::result::SdkError<
23                ::aws_smithy_runtime_api::client::interceptors::context::Error,
24                ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
25            >| { err.map_service_error(|err| err.downcast::<crate::operation::encrypt::EncryptError>().expect("correct error type")) };
26        let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
27            .await
28            .map_err(map_err)?;
29        let output = context.finalize().map_err(map_err)?;
30        ::std::result::Result::Ok(
31            output
32                .downcast::<crate::operation::encrypt::EncryptOutput>()
33                .expect("correct output type"),
34        )
35    }
36
37    pub(crate) async fn orchestrate_with_stop_point(
38        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
39        input: crate::operation::encrypt::EncryptInput,
40        stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
41    ) -> ::std::result::Result<
42        ::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext,
43        ::aws_smithy_runtime_api::client::result::SdkError<
44            ::aws_smithy_runtime_api::client::interceptors::context::Error,
45            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
46        >,
47    > {
48        let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
49        ::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point("kms", "Encrypt", input, runtime_plugins, stop_point).await
50    }
51
52    pub(crate) fn operation_runtime_plugins(
53        client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
54        client_config: &crate::config::Config,
55        config_override: ::std::option::Option<crate::config::Builder>,
56    ) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
57        let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
58        runtime_plugins = runtime_plugins.with_client_plugin(crate::auth_plugin::DefaultAuthOptionsPlugin::new(vec![
59            ::aws_runtime::auth::sigv4::SCHEME_ID,
60        ]));
61        if let ::std::option::Option::Some(config_override) = config_override {
62            for plugin in config_override.runtime_plugins.iter().cloned() {
63                runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
64            }
65            runtime_plugins = runtime_plugins.with_operation_plugin(crate::config::ConfigOverrideRuntimePlugin::new(
66                config_override,
67                client_config.config.clone(),
68                &client_config.runtime_components,
69            ));
70        }
71        runtime_plugins
72    }
73}
74impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for Encrypt {
75    fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
76        let mut cfg = ::aws_smithy_types::config_bag::Layer::new("Encrypt");
77
78        cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(
79            EncryptRequestSerializer,
80        ));
81        cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(
82            EncryptResponseDeserializer,
83        ));
84
85        cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(
86            ::aws_smithy_runtime_api::client::auth::static_resolver::StaticAuthSchemeOptionResolverParams::new(),
87        ));
88
89        cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new("Encrypt", "kms"));
90        let mut signing_options = ::aws_runtime::auth::SigningOptions::default();
91        signing_options.double_uri_encode = true;
92        signing_options.content_sha256_header = false;
93        signing_options.normalize_uri_path = true;
94        signing_options.payload_override = None;
95
96        cfg.store_put(::aws_runtime::auth::SigV4OperationSigningConfig {
97            signing_options,
98            ..::std::default::Default::default()
99        });
100
101        ::std::option::Option::Some(cfg.freeze())
102    }
103
104    fn runtime_components(
105        &self,
106        _: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder,
107    ) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
108        #[allow(unused_mut)]
109        let mut rcb = ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("Encrypt")
110            .with_interceptor(::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default())
111            .with_interceptor(EncryptEndpointParamsInterceptor)
112            .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<
113                crate::operation::encrypt::EncryptError,
114            >::new())
115            .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<
116                crate::operation::encrypt::EncryptError,
117            >::new())
118            .with_retry_classifier(::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<
119                crate::operation::encrypt::EncryptError,
120            >::new());
121
122        ::std::borrow::Cow::Owned(rcb)
123    }
124}
125
126#[derive(Debug)]
127struct EncryptResponseDeserializer;
128impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for EncryptResponseDeserializer {
129    fn deserialize_nonstreaming(
130        &self,
131        response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
132    ) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
133        let (success, status) = (response.status().is_success(), response.status().as_u16());
134        let headers = response.headers();
135        let body = response.body().bytes().expect("body loaded");
136        #[allow(unused_mut)]
137        let mut force_error = false;
138        ::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
139        let parse_result = if !success && status != 200 || force_error {
140            crate::protocol_serde::shape_encrypt::de_encrypt_http_error(status, headers, body)
141        } else {
142            crate::protocol_serde::shape_encrypt::de_encrypt_http_response(status, headers, body)
143        };
144        crate::protocol_serde::type_erase_result(parse_result)
145    }
146}
147#[derive(Debug)]
148struct EncryptRequestSerializer;
149impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for EncryptRequestSerializer {
150    #[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
151    fn serialize_input(
152        &self,
153        input: ::aws_smithy_runtime_api::client::interceptors::context::Input,
154        _cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
155    ) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
156        let input = input.downcast::<crate::operation::encrypt::EncryptInput>().expect("correct type");
157        let _header_serialization_settings = _cfg
158            .load::<crate::serialization_settings::HeaderSerializationSettings>()
159            .cloned()
160            .unwrap_or_default();
161        let mut request_builder = {
162            fn uri_base(
163                _input: &crate::operation::encrypt::EncryptInput,
164                output: &mut ::std::string::String,
165            ) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
166                use ::std::fmt::Write as _;
167                ::std::write!(output, "/").expect("formatting should succeed");
168                ::std::result::Result::Ok(())
169            }
170            #[allow(clippy::unnecessary_wraps)]
171            fn update_http_builder(
172                input: &crate::operation::encrypt::EncryptInput,
173                builder: ::http::request::Builder,
174            ) -> ::std::result::Result<::http::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
175                let mut uri = ::std::string::String::new();
176                uri_base(input, &mut uri)?;
177                ::std::result::Result::Ok(builder.method("POST").uri(uri))
178            }
179            let mut builder = update_http_builder(&input, ::http::request::Builder::new())?;
180            builder = _header_serialization_settings.set_default_header(builder, ::http::header::CONTENT_TYPE, "application/x-amz-json-1.1");
181            builder = _header_serialization_settings.set_default_header(
182                builder,
183                ::http::header::HeaderName::from_static("x-amz-target"),
184                "TrentService.Encrypt",
185            );
186            builder
187        };
188        let body = ::aws_smithy_types::body::SdkBody::from(crate::protocol_serde::shape_encrypt::ser_encrypt_input(&input)?);
189        if let Some(content_length) = body.content_length() {
190            let content_length = content_length.to_string();
191            request_builder = _header_serialization_settings.set_default_header(request_builder, ::http::header::CONTENT_LENGTH, &content_length);
192        }
193        ::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
194    }
195}
196#[derive(Debug)]
197struct EncryptEndpointParamsInterceptor;
198
199impl ::aws_smithy_runtime_api::client::interceptors::Intercept for EncryptEndpointParamsInterceptor {
200    fn name(&self) -> &'static str {
201        "EncryptEndpointParamsInterceptor"
202    }
203
204    fn read_before_execution(
205        &self,
206        context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<
207            '_,
208            ::aws_smithy_runtime_api::client::interceptors::context::Input,
209            ::aws_smithy_runtime_api::client::interceptors::context::Output,
210            ::aws_smithy_runtime_api::client::interceptors::context::Error,
211        >,
212        cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
213    ) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
214        let _input = context
215            .input()
216            .downcast_ref::<EncryptInput>()
217            .ok_or("failed to downcast to EncryptInput")?;
218
219        let params = crate::config::endpoint::Params::builder()
220            .set_region(cfg.load::<::aws_types::region::Region>().map(|r| r.as_ref().to_owned()))
221            .set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
222            .set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
223            .set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
224            .build()
225            .map_err(|err| {
226                ::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err)
227            })?;
228        cfg.interceptor_state()
229            .store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
230        ::std::result::Result::Ok(())
231    }
232}
233
234// The get_* functions below are generated from JMESPath expressions in the
235// operationContextParams trait. They target the operation's input shape.
236
237/// Error type for the `EncryptError` operation.
238#[non_exhaustive]
239#[derive(::std::fmt::Debug)]
240pub enum EncryptError {
241    /// <p>The system timed out while trying to fulfill the request. You can retry the request.</p>
242    DependencyTimeoutException(crate::types::error::DependencyTimeoutException),
243    /// <p>The request was rejected because the specified KMS key is not enabled.</p>
244    DisabledException(crate::types::error::DisabledException),
245    /// <p>The request was rejected because the DryRun parameter was specified.</p>
246    DryRunOperationException(crate::types::error::DryRunOperationException),
247    /// <p>The request was rejected because the specified grant token is not valid.</p>
248    InvalidGrantTokenException(crate::types::error::InvalidGrantTokenException),
249    /// <p>The request was rejected for one of the following reasons:</p>
250    /// <ul>
251    /// <li>
252    /// <p>The <code>KeyUsage</code> value of the KMS key is incompatible with the API operation.</p></li>
253    /// <li>
254    /// <p>The encryption algorithm or signing algorithm specified for the operation is incompatible with the type of key material in the KMS key <code>(KeySpec</code>).</p></li>
255    /// </ul>
256    /// <p>For encrypting, decrypting, re-encrypting, and generating data keys, the <code>KeyUsage</code> must be <code>ENCRYPT_DECRYPT</code>. For signing and verifying messages, the <code>KeyUsage</code> must be <code>SIGN_VERIFY</code>. For generating and verifying message authentication codes (MACs), the <code>KeyUsage</code> must be <code>GENERATE_VERIFY_MAC</code>. For deriving key agreement secrets, the <code>KeyUsage</code> must be <code>KEY_AGREEMENT</code>. To find the <code>KeyUsage</code> of a KMS key, use the <code>DescribeKey</code> operation.</p>
257    /// <p>To find the encryption or signing algorithms supported for a particular KMS key, use the <code>DescribeKey</code> operation.</p>
258    InvalidKeyUsageException(crate::types::error::InvalidKeyUsageException),
259    /// <p>The request was rejected because the specified KMS key was not available. You can retry the request.</p>
260    KeyUnavailableException(crate::types::error::KeyUnavailableException),
261    /// <p>The request was rejected because an internal exception occurred. The request can be retried.</p>
262    KmsInternalException(crate::types::error::KmsInternalException),
263    /// <p>The request was rejected because the state of the specified resource is not valid for this request.</p>
264    /// <p>This exceptions means one of the following:</p>
265    /// <ul>
266    /// <li>
267    /// <p>The key state of the KMS key is not compatible with the operation.</p>
268    /// <p>To find the key state, use the <code>DescribeKey</code> operation. For more information about which key states are compatible with each KMS operation, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i> <i>Key Management Service Developer Guide</i> </i>.</p></li>
269    /// <li>
270    /// <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p></li>
271    /// </ul>
272    KmsInvalidStateException(crate::types::error::KmsInvalidStateException),
273    /// <p>The request was rejected because the specified entity or resource could not be found.</p>
274    NotFoundException(crate::types::error::NotFoundException),
275    /// An unexpected error occurred (e.g., invalid JSON returned by the service or an unknown error code).
276    #[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
277    variable wildcard pattern and check `.code()`:
278     \
279    &nbsp;&nbsp;&nbsp;`err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
280     \
281    See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-EncryptError) for what information is available for the error.")]
282    Unhandled(crate::error::sealed_unhandled::Unhandled),
283}
284impl EncryptError {
285    /// Creates the `EncryptError::Unhandled` variant from any error type.
286    pub fn unhandled(
287        err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>,
288    ) -> Self {
289        Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
290            source: err.into(),
291            meta: ::std::default::Default::default(),
292        })
293    }
294
295    /// Creates the `EncryptError::Unhandled` variant from an [`ErrorMetadata`](::aws_smithy_types::error::ErrorMetadata).
296    pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
297        Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
298            source: err.clone().into(),
299            meta: err,
300        })
301    }
302    ///
303    /// Returns error metadata, which includes the error code, message,
304    /// request ID, and potentially additional information.
305    ///
306    pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
307        match self {
308            Self::DependencyTimeoutException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
309            Self::DisabledException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
310            Self::DryRunOperationException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
311            Self::InvalidGrantTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
312            Self::InvalidKeyUsageException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
313            Self::KeyUnavailableException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
314            Self::KmsInternalException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
315            Self::KmsInvalidStateException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
316            Self::NotFoundException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
317            Self::Unhandled(e) => &e.meta,
318        }
319    }
320    /// Returns `true` if the error kind is `EncryptError::DependencyTimeoutException`.
321    pub fn is_dependency_timeout_exception(&self) -> bool {
322        matches!(self, Self::DependencyTimeoutException(_))
323    }
324    /// Returns `true` if the error kind is `EncryptError::DisabledException`.
325    pub fn is_disabled_exception(&self) -> bool {
326        matches!(self, Self::DisabledException(_))
327    }
328    /// Returns `true` if the error kind is `EncryptError::DryRunOperationException`.
329    pub fn is_dry_run_operation_exception(&self) -> bool {
330        matches!(self, Self::DryRunOperationException(_))
331    }
332    /// Returns `true` if the error kind is `EncryptError::InvalidGrantTokenException`.
333    pub fn is_invalid_grant_token_exception(&self) -> bool {
334        matches!(self, Self::InvalidGrantTokenException(_))
335    }
336    /// Returns `true` if the error kind is `EncryptError::InvalidKeyUsageException`.
337    pub fn is_invalid_key_usage_exception(&self) -> bool {
338        matches!(self, Self::InvalidKeyUsageException(_))
339    }
340    /// Returns `true` if the error kind is `EncryptError::KeyUnavailableException`.
341    pub fn is_key_unavailable_exception(&self) -> bool {
342        matches!(self, Self::KeyUnavailableException(_))
343    }
344    /// Returns `true` if the error kind is `EncryptError::KmsInternalException`.
345    pub fn is_kms_internal_exception(&self) -> bool {
346        matches!(self, Self::KmsInternalException(_))
347    }
348    /// Returns `true` if the error kind is `EncryptError::KmsInvalidStateException`.
349    pub fn is_kms_invalid_state_exception(&self) -> bool {
350        matches!(self, Self::KmsInvalidStateException(_))
351    }
352    /// Returns `true` if the error kind is `EncryptError::NotFoundException`.
353    pub fn is_not_found_exception(&self) -> bool {
354        matches!(self, Self::NotFoundException(_))
355    }
356}
357impl ::std::error::Error for EncryptError {
358    fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
359        match self {
360            Self::DependencyTimeoutException(_inner) => ::std::option::Option::Some(_inner),
361            Self::DisabledException(_inner) => ::std::option::Option::Some(_inner),
362            Self::DryRunOperationException(_inner) => ::std::option::Option::Some(_inner),
363            Self::InvalidGrantTokenException(_inner) => ::std::option::Option::Some(_inner),
364            Self::InvalidKeyUsageException(_inner) => ::std::option::Option::Some(_inner),
365            Self::KeyUnavailableException(_inner) => ::std::option::Option::Some(_inner),
366            Self::KmsInternalException(_inner) => ::std::option::Option::Some(_inner),
367            Self::KmsInvalidStateException(_inner) => ::std::option::Option::Some(_inner),
368            Self::NotFoundException(_inner) => ::std::option::Option::Some(_inner),
369            Self::Unhandled(_inner) => ::std::option::Option::Some(&*_inner.source),
370        }
371    }
372}
373impl ::std::fmt::Display for EncryptError {
374    fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
375        match self {
376            Self::DependencyTimeoutException(_inner) => _inner.fmt(f),
377            Self::DisabledException(_inner) => _inner.fmt(f),
378            Self::DryRunOperationException(_inner) => _inner.fmt(f),
379            Self::InvalidGrantTokenException(_inner) => _inner.fmt(f),
380            Self::InvalidKeyUsageException(_inner) => _inner.fmt(f),
381            Self::KeyUnavailableException(_inner) => _inner.fmt(f),
382            Self::KmsInternalException(_inner) => _inner.fmt(f),
383            Self::KmsInvalidStateException(_inner) => _inner.fmt(f),
384            Self::NotFoundException(_inner) => _inner.fmt(f),
385            Self::Unhandled(_inner) => {
386                if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
387                    write!(f, "unhandled error ({code})")
388                } else {
389                    f.write_str("unhandled error")
390                }
391            }
392        }
393    }
394}
395impl ::aws_smithy_types::retry::ProvideErrorKind for EncryptError {
396    fn code(&self) -> ::std::option::Option<&str> {
397        ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
398    }
399    fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
400        ::std::option::Option::None
401    }
402}
403impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for EncryptError {
404    fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
405        match self {
406            Self::DependencyTimeoutException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
407            Self::DisabledException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
408            Self::DryRunOperationException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
409            Self::InvalidGrantTokenException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
410            Self::InvalidKeyUsageException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
411            Self::KeyUnavailableException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
412            Self::KmsInternalException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
413            Self::KmsInvalidStateException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
414            Self::NotFoundException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
415            Self::Unhandled(_inner) => &_inner.meta,
416        }
417    }
418}
419impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for EncryptError {
420    fn create_unhandled_error(
421        source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
422        meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>,
423    ) -> Self {
424        Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
425            source,
426            meta: meta.unwrap_or_default(),
427        })
428    }
429}
430impl ::aws_types::request_id::RequestId for crate::operation::encrypt::EncryptError {
431    fn request_id(&self) -> Option<&str> {
432        self.meta().request_id()
433    }
434}
435
436pub use crate::operation::encrypt::_encrypt_output::EncryptOutput;
437
438pub use crate::operation::encrypt::_encrypt_input::EncryptInput;
439
440mod _encrypt_input;
441
442mod _encrypt_output;
443
444/// Builders
445pub mod builders;