aws_sdk_s3/operation/
put_bucket_encryption.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2/// Orchestration and serialization glue logic for `PutBucketEncryption`.
3#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
4#[non_exhaustive]
5pub struct PutBucketEncryption;
6impl PutBucketEncryption {
7    /// Creates a new `PutBucketEncryption`
8    pub fn new() -> Self {
9        Self
10    }
11    pub(crate) async fn orchestrate(
12        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
13        input: crate::operation::put_bucket_encryption::PutBucketEncryptionInput,
14    ) -> ::std::result::Result<
15        crate::operation::put_bucket_encryption::PutBucketEncryptionOutput,
16        ::aws_smithy_runtime_api::client::result::SdkError<
17            crate::operation::put_bucket_encryption::PutBucketEncryptionError,
18            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
19        >,
20    > {
21        let map_err = |err: ::aws_smithy_runtime_api::client::result::SdkError<
22            ::aws_smithy_runtime_api::client::interceptors::context::Error,
23            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
24        >| {
25            err.map_service_error(|err| {
26                err.downcast::<crate::operation::put_bucket_encryption::PutBucketEncryptionError>()
27                    .expect("correct error type")
28            })
29        };
30        use ::tracing::Instrument;
31        let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
32            // Create a parent span for the entire operation. Includes a random, internal-only,
33            // seven-digit ID for the operation orchestration so that it can be correlated in the logs.
34            .instrument(::tracing::debug_span!(
35                "s3.PutBucketEncryption",
36                "rpc.service" = "s3",
37                "rpc.method" = "PutBucketEncryption",
38                "sdk_invocation_id" = ::fastrand::u32(1_000_000..10_000_000),
39                "rpc.system" = "aws-api",
40            ))
41            .await
42            .map_err(map_err)?;
43        let output = context.finalize().map_err(map_err)?;
44        ::std::result::Result::Ok(
45            output
46                .downcast::<crate::operation::put_bucket_encryption::PutBucketEncryptionOutput>()
47                .expect("correct output type"),
48        )
49    }
50
51    pub(crate) async fn orchestrate_with_stop_point(
52        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
53        input: crate::operation::put_bucket_encryption::PutBucketEncryptionInput,
54        stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
55    ) -> ::std::result::Result<
56        ::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext,
57        ::aws_smithy_runtime_api::client::result::SdkError<
58            ::aws_smithy_runtime_api::client::interceptors::context::Error,
59            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
60        >,
61    > {
62        let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
63        ::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point("s3", "PutBucketEncryption", input, runtime_plugins, stop_point).await
64    }
65
66    pub(crate) fn operation_runtime_plugins(
67        client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
68        client_config: &crate::config::Config,
69        config_override: ::std::option::Option<crate::config::Builder>,
70    ) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
71        let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
72        runtime_plugins = runtime_plugins.with_client_plugin(crate::auth_plugin::DefaultAuthOptionsPlugin::new(vec![
73            ::aws_runtime::auth::sigv4::SCHEME_ID,
74            #[cfg(feature = "sigv4a")]
75            {
76                ::aws_runtime::auth::sigv4a::SCHEME_ID
77            },
78            crate::s3_express::auth::SCHEME_ID,
79            ::aws_smithy_runtime::client::auth::no_auth::NO_AUTH_SCHEME_ID,
80        ]));
81        if let ::std::option::Option::Some(config_override) = config_override {
82            for plugin in config_override.runtime_plugins.iter().cloned() {
83                runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
84            }
85            runtime_plugins = runtime_plugins.with_operation_plugin(crate::config::ConfigOverrideRuntimePlugin::new(
86                config_override,
87                client_config.config.clone(),
88                &client_config.runtime_components,
89            ));
90        }
91        runtime_plugins
92    }
93}
94impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for PutBucketEncryption {
95    fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
96        let mut cfg = ::aws_smithy_types::config_bag::Layer::new("PutBucketEncryption");
97
98        cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(
99            PutBucketEncryptionRequestSerializer,
100        ));
101        cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(
102            PutBucketEncryptionResponseDeserializer,
103        ));
104
105        cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(
106            ::aws_smithy_runtime_api::client::auth::static_resolver::StaticAuthSchemeOptionResolverParams::new(),
107        ));
108
109        cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new("PutBucketEncryption", "s3"));
110        let mut signing_options = ::aws_runtime::auth::SigningOptions::default();
111        signing_options.double_uri_encode = false;
112        signing_options.content_sha256_header = true;
113        signing_options.normalize_uri_path = false;
114        signing_options.payload_override = None;
115
116        cfg.store_put(::aws_runtime::auth::SigV4OperationSigningConfig {
117            signing_options,
118            ..::std::default::Default::default()
119        });
120        cfg.store_put(crate::s3_express::checksum::provide_default_checksum_algorithm());
121
122        ::std::option::Option::Some(cfg.freeze())
123    }
124
125    fn runtime_components(
126        &self,
127        _: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder,
128    ) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
129        #[allow(unused_mut)]
130                    let mut rcb = ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("PutBucketEncryption")
131                            .with_interceptor(::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default())
132.with_interceptor(PutBucketEncryptionEndpointParamsInterceptor)
133.with_interceptor(crate::http_request_checksum::RequestChecksumInterceptor::new(
134                                |input: &::aws_smithy_runtime_api::client::interceptors::context::Input| {
135                                    let input: &crate::operation::put_bucket_encryption::PutBucketEncryptionInput = input.downcast_ref().expect("correct type");
136                                    let checksum_algorithm = input.checksum_algorithm();
137                                    let checksum_algorithm = checksum_algorithm.map(|algorithm| algorithm.as_str());
138                                    (checksum_algorithm.map(|s| s.to_string()), true)
139                                },
140                                |request: &mut ::aws_smithy_runtime_api::http::Request, cfg: &::aws_smithy_types::config_bag::ConfigBag| {
141                                    // We check if the user has set any of the checksum values manually
142                                    let mut user_set_checksum_value = false;
143                                    let headers_to_check = request.headers().iter().filter_map(|(name, _val)| {
144                                        if name.starts_with("x-amz-checksum-") {
145                                            Some(name)
146                                        } else {
147                                            None
148                                        }
149                                    });
150                                    for algo_header in headers_to_check {
151                                        if request.headers().get(algo_header).is_some() {
152                                            user_set_checksum_value = true;
153                                        }
154                                    }
155
156                                    // We check if the user set the checksum algo manually
157                                    let user_set_checksum_algo = request.headers()
158                                        .get("x-amz-sdk-checksum-algorithm")
159                                        .is_some();
160
161                                    // This value is set by the user on the SdkConfig to indicate their preference
162                                    let request_checksum_calculation = cfg
163                                        .load::<::aws_smithy_types::checksum_config::RequestChecksumCalculation>()
164                                        .unwrap_or(&::aws_smithy_types::checksum_config::RequestChecksumCalculation::WhenSupported);
165
166                                    // From the httpChecksum trait
167                                    let http_checksum_required = true;
168
169                                    let is_presigned_req = cfg.load::<crate::presigning::PresigningMarker>().is_some();
170
171                                    // If the request is presigned we do not set a default.
172                                    // If the RequestChecksumCalculation is WhenSupported and the user has not set a checksum value or algo
173                                    // we default to Crc32. If it is WhenRequired and a checksum is required by the trait and the user has not
174                                    // set a checksum value or algo we also set the default. In all other cases we do nothing.
175                                    match (
176                                        request_checksum_calculation,
177                                        http_checksum_required,
178                                        user_set_checksum_value,
179                                        user_set_checksum_algo,
180                                        is_presigned_req,
181                                    ) {
182                                        (_, _, _, _, true) => {}
183                                        (::aws_smithy_types::checksum_config::RequestChecksumCalculation::WhenSupported, _, false, false, _)
184                                        | (::aws_smithy_types::checksum_config::RequestChecksumCalculation::WhenRequired, true, false, false, _) => {
185                                            request.headers_mut().insert("x-amz-sdk-checksum-algorithm", "CRC32");
186                                        }
187                                        _ => {},
188                                    }
189
190                                    // We return a bool indicating if the user did set the checksum value, if they did
191                                    // we can short circuit and exit the interceptor early.
192                                    Ok(user_set_checksum_value)
193                                }
194                                ))
195                            .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<crate::operation::put_bucket_encryption::PutBucketEncryptionError>::new())
196.with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<crate::operation::put_bucket_encryption::PutBucketEncryptionError>::new())
197.with_retry_classifier(::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<crate::operation::put_bucket_encryption::PutBucketEncryptionError>::builder().transient_errors({
198                                            let mut transient_errors: Vec<&'static str> = ::aws_runtime::retries::classifiers::TRANSIENT_ERRORS.into();
199                                            transient_errors.push("InternalError");
200                                            ::std::borrow::Cow::Owned(transient_errors)
201                                            }).build());
202
203        ::std::borrow::Cow::Owned(rcb)
204    }
205}
206
207#[derive(Debug)]
208struct PutBucketEncryptionResponseDeserializer;
209impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for PutBucketEncryptionResponseDeserializer {
210    fn deserialize_nonstreaming(
211        &self,
212        response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
213    ) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
214        let (success, status) = (response.status().is_success(), response.status().as_u16());
215        let headers = response.headers();
216        let body = response.body().bytes().expect("body loaded");
217        #[allow(unused_mut)]
218        let mut force_error = false;
219        ::tracing::debug!(extended_request_id = ?crate::s3_request_id::RequestIdExt::extended_request_id(response));
220        if matches!(crate::rest_xml_unwrapped_errors::body_is_error(body), Ok(true)) {
221            force_error = true;
222        }
223        ::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
224        let parse_result = if !success && status != 200 || force_error {
225            crate::protocol_serde::shape_put_bucket_encryption::de_put_bucket_encryption_http_error(status, headers, body)
226        } else {
227            crate::protocol_serde::shape_put_bucket_encryption::de_put_bucket_encryption_http_response(status, headers, body)
228        };
229        crate::protocol_serde::type_erase_result(parse_result)
230    }
231}
232#[derive(Debug)]
233struct PutBucketEncryptionRequestSerializer;
234impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for PutBucketEncryptionRequestSerializer {
235    #[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
236    fn serialize_input(
237        &self,
238        input: ::aws_smithy_runtime_api::client::interceptors::context::Input,
239        _cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
240    ) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
241        let input = input
242            .downcast::<crate::operation::put_bucket_encryption::PutBucketEncryptionInput>()
243            .expect("correct type");
244        let _header_serialization_settings = _cfg
245            .load::<crate::serialization_settings::HeaderSerializationSettings>()
246            .cloned()
247            .unwrap_or_default();
248        let mut request_builder = {
249            fn uri_base(
250                _input: &crate::operation::put_bucket_encryption::PutBucketEncryptionInput,
251                output: &mut ::std::string::String,
252            ) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
253                use ::std::fmt::Write as _;
254                ::std::write!(output, "/").expect("formatting should succeed");
255                ::std::result::Result::Ok(())
256            }
257            fn uri_query(
258                _input: &crate::operation::put_bucket_encryption::PutBucketEncryptionInput,
259                mut output: &mut ::std::string::String,
260            ) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
261                let mut query = ::aws_smithy_http::query::Writer::new(output);
262                query.push_v("encryption");
263                ::std::result::Result::Ok(())
264            }
265            #[allow(clippy::unnecessary_wraps)]
266            fn update_http_builder(
267                input: &crate::operation::put_bucket_encryption::PutBucketEncryptionInput,
268                builder: ::http::request::Builder,
269            ) -> ::std::result::Result<::http::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
270                let mut uri = ::std::string::String::new();
271                uri_base(input, &mut uri)?;
272                uri_query(input, &mut uri)?;
273                let builder = crate::protocol_serde::shape_put_bucket_encryption::ser_put_bucket_encryption_headers(input, builder)?;
274                ::std::result::Result::Ok(builder.method("PUT").uri(uri))
275            }
276            let mut builder = update_http_builder(&input, ::http::request::Builder::new())?;
277            builder = _header_serialization_settings.set_default_header(builder, ::http::header::CONTENT_TYPE, "application/xml");
278            builder
279        };
280        let body = ::aws_smithy_types::body::SdkBody::from(
281            crate::protocol_serde::shape_put_bucket_encryption_input::ser_server_side_encryption_configuration_http_payload(
282                &input.server_side_encryption_configuration,
283            )?,
284        );
285        if let Some(content_length) = body.content_length() {
286            let content_length = content_length.to_string();
287            request_builder = _header_serialization_settings.set_default_header(request_builder, ::http::header::CONTENT_LENGTH, &content_length);
288        }
289        ::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
290    }
291}
292#[derive(Debug)]
293struct PutBucketEncryptionEndpointParamsInterceptor;
294
295impl ::aws_smithy_runtime_api::client::interceptors::Intercept for PutBucketEncryptionEndpointParamsInterceptor {
296    fn name(&self) -> &'static str {
297        "PutBucketEncryptionEndpointParamsInterceptor"
298    }
299
300    fn read_before_execution(
301        &self,
302        context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<
303            '_,
304            ::aws_smithy_runtime_api::client::interceptors::context::Input,
305            ::aws_smithy_runtime_api::client::interceptors::context::Output,
306            ::aws_smithy_runtime_api::client::interceptors::context::Error,
307        >,
308        cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
309    ) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
310        let _input = context
311            .input()
312            .downcast_ref::<PutBucketEncryptionInput>()
313            .ok_or("failed to downcast to PutBucketEncryptionInput")?;
314
315        let params = crate::config::endpoint::Params::builder()
316            .set_region(cfg.load::<::aws_types::region::Region>().map(|r| r.as_ref().to_owned()))
317            .set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
318            .set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
319            .set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
320            .set_force_path_style(cfg.load::<crate::config::ForcePathStyle>().map(|ty| ty.0))
321            .set_use_arn_region(cfg.load::<crate::config::UseArnRegion>().map(|ty| ty.0))
322            .set_disable_multi_region_access_points(cfg.load::<crate::config::DisableMultiRegionAccessPoints>().map(|ty| ty.0))
323            .set_accelerate(cfg.load::<crate::config::Accelerate>().map(|ty| ty.0))
324            .set_disable_s3_express_session_auth(cfg.load::<crate::config::DisableS3ExpressSessionAuth>().map(|ty| ty.0))
325            .set_use_s3_express_control_endpoint(Some(true))
326            .set_bucket(Some(
327                _input
328                    .bucket
329                    .clone()
330                    .filter(|f| !AsRef::<str>::as_ref(f).trim().is_empty())
331                    .ok_or_else(|| ::aws_smithy_types::error::operation::BuildError::missing_field("bucket", "A required field was not set"))?,
332            ))
333            .build()
334            .map_err(|err| {
335                ::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err)
336            })?;
337        cfg.interceptor_state()
338            .store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
339        ::std::result::Result::Ok(())
340    }
341}
342
343// The get_* functions below are generated from JMESPath expressions in the
344// operationContextParams trait. They target the operation's input shape.
345
346/// Error type for the `PutBucketEncryptionError` operation.
347#[non_exhaustive]
348#[derive(::std::fmt::Debug)]
349pub enum PutBucketEncryptionError {
350    /// An unexpected error occurred (e.g., invalid JSON returned by the service or an unknown error code).
351    #[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
352    variable wildcard pattern and check `.code()`:
353     \
354    &nbsp;&nbsp;&nbsp;`err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
355     \
356    See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-PutBucketEncryptionError) for what information is available for the error.")]
357    Unhandled(crate::error::sealed_unhandled::Unhandled),
358}
359impl PutBucketEncryptionError {
360    /// Creates the `PutBucketEncryptionError::Unhandled` variant from any error type.
361    pub fn unhandled(
362        err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>,
363    ) -> Self {
364        Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
365            source: err.into(),
366            meta: ::std::default::Default::default(),
367        })
368    }
369
370    /// Creates the `PutBucketEncryptionError::Unhandled` variant from an [`ErrorMetadata`](::aws_smithy_types::error::ErrorMetadata).
371    pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
372        Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
373            source: err.clone().into(),
374            meta: err,
375        })
376    }
377    ///
378    /// Returns error metadata, which includes the error code, message,
379    /// request ID, and potentially additional information.
380    ///
381    pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
382        match self {
383            Self::Unhandled(e) => &e.meta,
384        }
385    }
386}
387impl ::std::error::Error for PutBucketEncryptionError {
388    fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
389        match self {
390            Self::Unhandled(_inner) => ::std::option::Option::Some(&*_inner.source),
391        }
392    }
393}
394impl ::std::fmt::Display for PutBucketEncryptionError {
395    fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
396        match self {
397            Self::Unhandled(_inner) => {
398                if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
399                    write!(f, "unhandled error ({code})")
400                } else {
401                    f.write_str("unhandled error")
402                }
403            }
404        }
405    }
406}
407impl ::aws_smithy_types::retry::ProvideErrorKind for PutBucketEncryptionError {
408    fn code(&self) -> ::std::option::Option<&str> {
409        ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
410    }
411    fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
412        ::std::option::Option::None
413    }
414}
415impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for PutBucketEncryptionError {
416    fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
417        match self {
418            Self::Unhandled(_inner) => &_inner.meta,
419        }
420    }
421}
422impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for PutBucketEncryptionError {
423    fn create_unhandled_error(
424        source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
425        meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>,
426    ) -> Self {
427        Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
428            source,
429            meta: meta.unwrap_or_default(),
430        })
431    }
432}
433impl crate::s3_request_id::RequestIdExt for crate::operation::put_bucket_encryption::PutBucketEncryptionError {
434    fn extended_request_id(&self) -> Option<&str> {
435        self.meta().extended_request_id()
436    }
437}
438impl ::aws_types::request_id::RequestId for crate::operation::put_bucket_encryption::PutBucketEncryptionError {
439    fn request_id(&self) -> Option<&str> {
440        self.meta().request_id()
441    }
442}
443
444pub use crate::operation::put_bucket_encryption::_put_bucket_encryption_output::PutBucketEncryptionOutput;
445
446pub use crate::operation::put_bucket_encryption::_put_bucket_encryption_input::PutBucketEncryptionInput;
447
448mod _put_bucket_encryption_input;
449
450mod _put_bucket_encryption_output;
451
452/// Builders
453pub mod builders;