Client Test

Client Test

rev. b089fac03cba5061dd86d9628e74511b55f01c68 (ignoring whitespace)

Files changed:

tmp-codegen-diff/codegen-client-test/aws_query/rust-client-codegen/src/operation/simple_input_params.rs

@@ -218,218 +616,638 @@
  238    238   
mod simple_input_params_test {
  239    239   
  240    240   
    /// Serializes strings
  241    241   
    /// Test ID: QuerySimpleInputParamsStrings
  242    242   
    #[::tokio::test]
  243    243   
    #[::tracing_test::traced_test]
  244    244   
    async fn query_simple_input_params_strings_request() {
  245    245   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  246    246   
        let config_builder = crate::config::Config::builder()
  247    247   
            .with_test_defaults()
  248         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         248  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         249  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         250  +
            .allow_no_auth()
  249    251   
            .endpoint_url("https://example.com");
  250    252   
  251    253   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  252    254   
        let result = client
  253    255   
            .simple_input_params()
  254    256   
            .set_foo(::std::option::Option::Some("val1".to_owned()))
  255    257   
            .set_bar(::std::option::Option::Some("val2".to_owned()))
  256    258   
            .send()
  257    259   
            .await;
  258    260   
        let _ = dbg!(result);
  259    261   
        let http_request = request_receiver.expect_request();
  260    262   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  261    263   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  262    264   
        let required_headers = &["Content-Length"];
  263    265   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  264    266   
        let body = http_request.body().bytes().expect("body should be strict");
  265    267   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  266    268   
            body,
  267    269   
            "Action=SimpleInputParams&Version=2020-01-08&Foo=val1&Bar=val2",
  268    270   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  269    271   
        ));
  270    272   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  271    273   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  272    274   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  273    275   
    }
  274    276   
  275    277   
    /// Serializes booleans that are true
  276    278   
    /// Test ID: QuerySimpleInputParamsStringAndBooleanTrue
  277    279   
    #[::tokio::test]
  278    280   
    #[::tracing_test::traced_test]
  279    281   
    async fn query_simple_input_params_string_and_boolean_true_request() {
  280    282   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  281    283   
        let config_builder = crate::config::Config::builder()
  282    284   
            .with_test_defaults()
  283         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         285  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         286  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         287  +
            .allow_no_auth()
  284    288   
            .endpoint_url("https://example.com");
  285    289   
  286    290   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  287    291   
        let result = client
  288    292   
            .simple_input_params()
  289    293   
            .set_foo(::std::option::Option::Some("val1".to_owned()))
  290    294   
            .set_baz(::std::option::Option::Some(true))
  291    295   
            .send()
  292    296   
            .await;
  293    297   
        let _ = dbg!(result);
  294    298   
        let http_request = request_receiver.expect_request();
  295    299   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  296    300   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  297    301   
        let required_headers = &["Content-Length"];
  298    302   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  299    303   
        let body = http_request.body().bytes().expect("body should be strict");
  300    304   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  301    305   
            body,
  302    306   
            "Action=SimpleInputParams&Version=2020-01-08&Foo=val1&Baz=true",
  303    307   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  304    308   
        ));
  305    309   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  306    310   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  307    311   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  308    312   
    }
  309    313   
  310    314   
    /// Serializes booleans that are false
  311    315   
    /// Test ID: QuerySimpleInputParamsStringsAndBooleanFalse
  312    316   
    #[::tokio::test]
  313    317   
    #[::tracing_test::traced_test]
  314    318   
    async fn query_simple_input_params_strings_and_boolean_false_request() {
  315    319   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  316    320   
        let config_builder = crate::config::Config::builder()
  317    321   
            .with_test_defaults()
  318         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         322  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         323  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         324  +
            .allow_no_auth()
  319    325   
            .endpoint_url("https://example.com");
  320    326   
  321    327   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  322    328   
        let result = client.simple_input_params().set_baz(::std::option::Option::Some(false)).send().await;
  323    329   
        let _ = dbg!(result);
  324    330   
        let http_request = request_receiver.expect_request();
  325    331   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  326    332   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  327    333   
        let required_headers = &["Content-Length"];
  328    334   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  329    335   
        let body = http_request.body().bytes().expect("body should be strict");
  330    336   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  331    337   
            body,
  332    338   
            "Action=SimpleInputParams&Version=2020-01-08&Baz=false",
  333    339   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  334    340   
        ));
  335    341   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  336    342   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  337    343   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  338    344   
    }
  339    345   
  340    346   
    /// Serializes integers
  341    347   
    /// Test ID: QuerySimpleInputParamsInteger
  342    348   
    #[::tokio::test]
  343    349   
    #[::tracing_test::traced_test]
  344    350   
    async fn query_simple_input_params_integer_request() {
  345    351   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  346    352   
        let config_builder = crate::config::Config::builder()
  347    353   
            .with_test_defaults()
  348         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         354  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         355  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         356  +
            .allow_no_auth()
  349    357   
            .endpoint_url("https://example.com");
  350    358   
  351    359   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  352    360   
        let result = client.simple_input_params().set_bam(::std::option::Option::Some(10)).send().await;
  353    361   
        let _ = dbg!(result);
  354    362   
        let http_request = request_receiver.expect_request();
  355    363   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  356    364   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  357    365   
        let required_headers = &["Content-Length"];
  358    366   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  359    367   
        let body = http_request.body().bytes().expect("body should be strict");
  360    368   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  361    369   
            body,
  362    370   
            "Action=SimpleInputParams&Version=2020-01-08&Bam=10",
  363    371   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  364    372   
        ));
  365    373   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  366    374   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  367    375   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  368    376   
    }
  369    377   
  370    378   
    /// Serializes floats
  371    379   
    /// Test ID: QuerySimpleInputParamsFloat
  372    380   
    #[::tokio::test]
  373    381   
    #[::tracing_test::traced_test]
  374    382   
    async fn query_simple_input_params_float_request() {
  375    383   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  376    384   
        let config_builder = crate::config::Config::builder()
  377    385   
            .with_test_defaults()
  378         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         386  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         387  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         388  +
            .allow_no_auth()
  379    389   
            .endpoint_url("https://example.com");
  380    390   
  381    391   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  382    392   
        let result = client.simple_input_params().set_boo(::std::option::Option::Some(10.8_f64)).send().await;
  383    393   
        let _ = dbg!(result);
  384    394   
        let http_request = request_receiver.expect_request();
  385    395   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  386    396   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  387    397   
        let required_headers = &["Content-Length"];
  388    398   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  389    399   
        let body = http_request.body().bytes().expect("body should be strict");
  390    400   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  391    401   
            body,
  392    402   
            "Action=SimpleInputParams&Version=2020-01-08&Boo=10.8",
  393    403   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  394    404   
        ));
  395    405   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  396    406   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  397    407   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  398    408   
    }
  399    409   
  400    410   
    /// Blobs are base64 encoded in the query string
  401    411   
    /// Test ID: QuerySimpleInputParamsBlob
  402    412   
    #[::tokio::test]
  403    413   
    #[::tracing_test::traced_test]
  404    414   
    async fn query_simple_input_params_blob_request() {
  405    415   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  406    416   
        let config_builder = crate::config::Config::builder()
  407    417   
            .with_test_defaults()
  408         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         418  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         419  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         420  +
            .allow_no_auth()
  409    421   
            .endpoint_url("https://example.com");
  410    422   
  411    423   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  412    424   
        let result = client
  413    425   
            .simple_input_params()
  414    426   
            .set_qux(::std::option::Option::Some(::aws_smithy_types::Blob::new("value")))
  415    427   
            .send()
  416    428   
            .await;
  417    429   
        let _ = dbg!(result);
  418    430   
        let http_request = request_receiver.expect_request();
  419    431   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  420    432   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  421    433   
        let required_headers = &["Content-Length"];
  422    434   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  423    435   
        let body = http_request.body().bytes().expect("body should be strict");
  424    436   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  425    437   
            body,
  426    438   
            "Action=SimpleInputParams&Version=2020-01-08&Qux=dmFsdWU%3D",
  427    439   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  428    440   
        ));
  429    441   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  430    442   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  431    443   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  432    444   
    }
  433    445   
  434    446   
    /// Serializes enums in the query string
  435    447   
    /// Test ID: QueryEnums
  436    448   
    #[::tokio::test]
  437    449   
    #[::tracing_test::traced_test]
  438    450   
    async fn query_enums_request() {
  439    451   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  440    452   
        let config_builder = crate::config::Config::builder()
  441    453   
            .with_test_defaults()
  442         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         454  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         455  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         456  +
            .allow_no_auth()
  443    457   
            .endpoint_url("https://example.com");
  444    458   
  445    459   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  446    460   
        let result = client
  447    461   
            .simple_input_params()
  448    462   
            .set_foo_enum(::std::option::Option::Some(
  449    463   
                "Foo".parse::<crate::types::FooEnum>().expect("static value validated to member"),
  450    464   
            ))
  451    465   
            .send()
  452    466   
            .await;
  453    467   
        let _ = dbg!(result);
  454    468   
        let http_request = request_receiver.expect_request();
  455    469   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  456    470   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  457    471   
        let required_headers = &["Content-Length"];
  458    472   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  459    473   
        let body = http_request.body().bytes().expect("body should be strict");
  460    474   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  461    475   
            body,
  462    476   
            "Action=SimpleInputParams&Version=2020-01-08&FooEnum=Foo",
  463    477   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  464    478   
        ));
  465    479   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  466    480   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  467    481   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  468    482   
    }
  469    483   
  470    484   
    /// Serializes intEnums in the query string
  471    485   
    /// Test ID: QueryIntEnums
  472    486   
    #[::tokio::test]
  473    487   
    #[::tracing_test::traced_test]
  474    488   
    async fn query_int_enums_request() {
  475    489   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  476    490   
        let config_builder = crate::config::Config::builder()
  477    491   
            .with_test_defaults()
  478         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         492  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         493  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         494  +
            .allow_no_auth()
  479    495   
            .endpoint_url("https://example.com");
  480    496   
  481    497   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  482    498   
        let result = client.simple_input_params().set_integer_enum(::std::option::Option::Some(1)).send().await;
  483    499   
        let _ = dbg!(result);
  484    500   
        let http_request = request_receiver.expect_request();
  485    501   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  486    502   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  487    503   
        let required_headers = &["Content-Length"];
  488    504   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  489    505   
        let body = http_request.body().bytes().expect("body should be strict");
  490    506   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  491    507   
            body,
  492    508   
            "Action=SimpleInputParams&Version=2020-01-08&IntegerEnum=1",
  493    509   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  494    510   
        ));
  495    511   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  496    512   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  497    513   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  498    514   
    }
  499    515   
  500    516   
    /// Supports handling NaN float values.
  501    517   
    /// Test ID: AwsQuerySupportsNaNFloatInputs
  502    518   
    #[::tokio::test]
  503    519   
    #[::tracing_test::traced_test]
  504    520   
    async fn aws_query_supports_na_n_float_inputs_request() {
  505    521   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  506    522   
        let config_builder = crate::config::Config::builder()
  507    523   
            .with_test_defaults()
  508         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         524  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         525  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         526  +
            .allow_no_auth()
  509    527   
            .endpoint_url("https://example.com");
  510    528   
  511    529   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  512    530   
        let result = client
  513    531   
            .simple_input_params()
  514    532   
            .set_float_value(::std::option::Option::Some(
  515    533   
                <f32 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("NaN").expect("invalid string for number"),
  516    534   
            ))
  517    535   
            .set_boo(::std::option::Option::Some(
  518    536   
                <f64 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("NaN").expect("invalid string for number"),
  519    537   
            ))
  520    538   
            .send()
  521    539   
            .await;
  522    540   
        let _ = dbg!(result);
  523    541   
        let http_request = request_receiver.expect_request();
  524    542   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  525    543   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  526    544   
        let required_headers = &["Content-Length"];
  527    545   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  528    546   
        let body = http_request.body().bytes().expect("body should be strict");
  529    547   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  530    548   
            body,
  531    549   
            "Action=SimpleInputParams&Version=2020-01-08&FloatValue=NaN&Boo=NaN",
  532    550   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  533    551   
        ));
  534    552   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  535    553   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  536    554   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  537    555   
    }
  538    556   
  539    557   
    /// Supports handling Infinity float values.
  540    558   
    /// Test ID: AwsQuerySupportsInfinityFloatInputs
  541    559   
    #[::tokio::test]
  542    560   
    #[::tracing_test::traced_test]
  543    561   
    async fn aws_query_supports_infinity_float_inputs_request() {
  544    562   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  545    563   
        let config_builder = crate::config::Config::builder()
  546    564   
            .with_test_defaults()
  547         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         565  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         566  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         567  +
            .allow_no_auth()
  548    568   
            .endpoint_url("https://example.com");
  549    569   
  550    570   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  551    571   
        let result = client
  552    572   
            .simple_input_params()
  553    573   
            .set_float_value(::std::option::Option::Some(
  554    574   
                <f32 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("Infinity").expect("invalid string for number"),
  555    575   
            ))
  556    576   
            .set_boo(::std::option::Option::Some(
  557    577   
                <f64 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("Infinity").expect("invalid string for number"),
  558    578   
            ))
  559    579   
            .send()
  560    580   
            .await;
  561    581   
        let _ = dbg!(result);
  562    582   
        let http_request = request_receiver.expect_request();
  563    583   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  564    584   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  565    585   
        let required_headers = &["Content-Length"];
  566    586   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  567    587   
        let body = http_request.body().bytes().expect("body should be strict");
  568    588   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  569    589   
            body,
  570    590   
            "Action=SimpleInputParams&Version=2020-01-08&FloatValue=Infinity&Boo=Infinity",
  571    591   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  572    592   
        ));
  573    593   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  574    594   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  575    595   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  576    596   
    }
  577    597   
  578    598   
    /// Supports handling -Infinity float values.
  579    599   
    /// Test ID: AwsQuerySupportsNegativeInfinityFloatInputs
  580    600   
    #[::tokio::test]
  581    601   
    #[::tracing_test::traced_test]
  582    602   
    async fn aws_query_supports_negative_infinity_float_inputs_request() {
  583    603   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  584    604   
        let config_builder = crate::config::Config::builder()
  585    605   
            .with_test_defaults()
  586         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         606  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         607  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         608  +
            .allow_no_auth()
  587    609   
            .endpoint_url("https://example.com");
  588    610   
  589    611   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  590    612   
        let result = client
  591    613   
            .simple_input_params()
  592    614   
            .set_float_value(::std::option::Option::Some(
  593    615   
                <f32 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("-Infinity").expect("invalid string for number"),
  594    616   
            ))
  595    617   
            .set_boo(::std::option::Option::Some(
  596    618   
                <f64 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("-Infinity").expect("invalid string for number"),

tmp-codegen-diff/codegen-client-test/dynamo/rust-client-codegen/src/config.rs

@@ -366,366 +425,443 @@
  386    386   
  387    387   
    /// Set the auth scheme resolver for the builder
  388    388   
    ///
  389    389   
    /// # Examples
  390    390   
    /// See an example for [`Self::auth_scheme_resolver`].
  391    391   
    pub fn set_auth_scheme_resolver(&mut self, auth_scheme_resolver: impl crate::config::auth::ResolveAuthScheme + 'static) -> &mut Self {
  392    392   
        self.runtime_components
  393    393   
            .set_auth_scheme_option_resolver(::std::option::Option::Some(auth_scheme_resolver.into_shared_resolver()));
  394    394   
        self
  395    395   
    }
         396  +
         397  +
    /// Enable no authentication regardless of what authentication mechanisms operations support
         398  +
    ///
         399  +
    /// This adds [NoAuthScheme](aws_smithy_runtime::client::auth::no_auth::NoAuthScheme) as a fallback
         400  +
    /// and the auth scheme resolver will use it when no other auth schemes are applicable.
         401  +
    pub fn allow_no_auth(mut self) -> Self {
         402  +
        self.set_allow_no_auth();
         403  +
        self
         404  +
    }
         405  +
         406  +
    /// Enable no authentication regardless of what authentication mechanisms operations support
         407  +
    ///
         408  +
    /// This adds [NoAuthScheme](aws_smithy_runtime::client::auth::no_auth::NoAuthScheme) as a fallback
         409  +
    /// and the auth scheme resolver will use it when no other auth schemes are applicable.
         410  +
    pub fn set_allow_no_auth(&mut self) -> &mut Self {
         411  +
        self.push_runtime_plugin(::aws_smithy_runtime::client::auth::no_auth::NoAuthRuntimePluginV2::new().into_shared());
         412  +
        self
         413  +
    }
  396    414   
    /// Set the auth scheme preference for an auth scheme resolver
  397    415   
    /// (typically the default auth scheme resolver).
  398    416   
    ///
  399    417   
    /// Each operation has a predefined order of auth schemes, as determined by the service,
  400    418   
    /// for auth scheme resolution. By using the auth scheme preference, customers
  401    419   
    /// can reorder the schemes resolved by the auth scheme resolver.
  402    420   
    ///
  403    421   
    /// The preference list is intended as a hint rather than a strict override.
  404    422   
    /// Any schemes not present in the originally resolved auth schemes will be ignored.
  405    423   
    ///
@@ -1214,1232 +1273,1292 @@
 1234   1252   
    {
 1235   1253   
        if config.behavior_version.is_none() {
 1236   1254   
            config.behavior_version = Some(::aws_smithy_runtime_api::client::behavior_version::BehaviorVersion::latest());
 1237   1255   
        }
 1238   1256   
    }
 1239   1257   
 1240   1258   
    let default_retry_partition = "dynamodb";
 1241   1259   
 1242   1260   
    let scope = "dynamo";
 1243   1261   
        1262  +
    #[allow(deprecated)]
 1244   1263   
                    let mut plugins = ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins::new()
 1245   1264   
                        // defaults
 1246   1265   
                        .with_client_plugins(::aws_smithy_runtime::client::defaults::default_plugins(
 1247   1266   
                            ::aws_smithy_runtime::client::defaults::DefaultPluginParams::new()
 1248   1267   
                                .with_retry_partition_name(default_retry_partition)
 1249   1268   
                                .with_behavior_version(config.behavior_version.expect("Invalid client configuration: A behavior major version must be set when sending a request or constructing a client. You must set it during client construction or by enabling the `behavior-version-latest` cargo feature."))
 1250   1269   
                        ))
 1251   1270   
                        // user config
 1252   1271   
                        .with_client_plugin(
 1253   1272   
                            ::aws_smithy_runtime_api::client::runtime_plugin::StaticRuntimePlugin::new()

tmp-codegen-diff/codegen-client-test/ebs/rust-client-codegen/src/config.rs

@@ -366,366 +425,443 @@
  386    386   
  387    387   
    /// Set the auth scheme resolver for the builder
  388    388   
    ///
  389    389   
    /// # Examples
  390    390   
    /// See an example for [`Self::auth_scheme_resolver`].
  391    391   
    pub fn set_auth_scheme_resolver(&mut self, auth_scheme_resolver: impl crate::config::auth::ResolveAuthScheme + 'static) -> &mut Self {
  392    392   
        self.runtime_components
  393    393   
            .set_auth_scheme_option_resolver(::std::option::Option::Some(auth_scheme_resolver.into_shared_resolver()));
  394    394   
        self
  395    395   
    }
         396  +
         397  +
    /// Enable no authentication regardless of what authentication mechanisms operations support
         398  +
    ///
         399  +
    /// This adds [NoAuthScheme](aws_smithy_runtime::client::auth::no_auth::NoAuthScheme) as a fallback
         400  +
    /// and the auth scheme resolver will use it when no other auth schemes are applicable.
         401  +
    pub fn allow_no_auth(mut self) -> Self {
         402  +
        self.set_allow_no_auth();
         403  +
        self
         404  +
    }
         405  +
         406  +
    /// Enable no authentication regardless of what authentication mechanisms operations support
         407  +
    ///
         408  +
    /// This adds [NoAuthScheme](aws_smithy_runtime::client::auth::no_auth::NoAuthScheme) as a fallback
         409  +
    /// and the auth scheme resolver will use it when no other auth schemes are applicable.
         410  +
    pub fn set_allow_no_auth(&mut self) -> &mut Self {
         411  +
        self.push_runtime_plugin(::aws_smithy_runtime::client::auth::no_auth::NoAuthRuntimePluginV2::new().into_shared());
         412  +
        self
         413  +
    }
  396    414   
    /// Set the auth scheme preference for an auth scheme resolver
  397    415   
    /// (typically the default auth scheme resolver).
  398    416   
    ///
  399    417   
    /// Each operation has a predefined order of auth schemes, as determined by the service,
  400    418   
    /// for auth scheme resolution. By using the auth scheme preference, customers
  401    419   
    /// can reorder the schemes resolved by the auth scheme resolver.
  402    420   
    ///
  403    421   
    /// The preference list is intended as a hint rather than a strict override.
  404    422   
    /// Any schemes not present in the originally resolved auth schemes will be ignored.
  405    423   
    ///
@@ -1214,1232 +1273,1292 @@
 1234   1252   
    {
 1235   1253   
        if config.behavior_version.is_none() {
 1236   1254   
            config.behavior_version = Some(::aws_smithy_runtime_api::client::behavior_version::BehaviorVersion::latest());
 1237   1255   
        }
 1238   1256   
    }
 1239   1257   
 1240   1258   
    let default_retry_partition = "ebs";
 1241   1259   
 1242   1260   
    let scope = "ebs";
 1243   1261   
        1262  +
    #[allow(deprecated)]
 1244   1263   
                    let mut plugins = ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins::new()
 1245   1264   
                        // defaults
 1246   1265   
                        .with_client_plugins(::aws_smithy_runtime::client::defaults::default_plugins(
 1247   1266   
                            ::aws_smithy_runtime::client::defaults::DefaultPluginParams::new()
 1248   1267   
                                .with_retry_partition_name(default_retry_partition)
 1249   1268   
                                .with_behavior_version(config.behavior_version.expect("Invalid client configuration: A behavior major version must be set when sending a request or constructing a client. You must set it during client construction or by enabling the `behavior-version-latest` cargo feature."))
 1250   1269   
                        ))
 1251   1270   
                        // user config
 1252   1271   
                        .with_client_plugin(
 1253   1272   
                            ::aws_smithy_runtime_api::client::runtime_plugin::StaticRuntimePlugin::new()

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/config.rs

@@ -366,366 +425,443 @@
  386    386   
  387    387   
    /// Set the auth scheme resolver for the builder
  388    388   
    ///
  389    389   
    /// # Examples
  390    390   
    /// See an example for [`Self::auth_scheme_resolver`].
  391    391   
    pub fn set_auth_scheme_resolver(&mut self, auth_scheme_resolver: impl crate::config::auth::ResolveAuthScheme + 'static) -> &mut Self {
  392    392   
        self.runtime_components
  393    393   
            .set_auth_scheme_option_resolver(::std::option::Option::Some(auth_scheme_resolver.into_shared_resolver()));
  394    394   
        self
  395    395   
    }
         396  +
         397  +
    /// Enable no authentication regardless of what authentication mechanisms operations support
         398  +
    ///
         399  +
    /// This adds [NoAuthScheme](aws_smithy_runtime::client::auth::no_auth::NoAuthScheme) as a fallback
         400  +
    /// and the auth scheme resolver will use it when no other auth schemes are applicable.
         401  +
    pub fn allow_no_auth(mut self) -> Self {
         402  +
        self.set_allow_no_auth();
         403  +
        self
         404  +
    }
         405  +
         406  +
    /// Enable no authentication regardless of what authentication mechanisms operations support
         407  +
    ///
         408  +
    /// This adds [NoAuthScheme](aws_smithy_runtime::client::auth::no_auth::NoAuthScheme) as a fallback
         409  +
    /// and the auth scheme resolver will use it when no other auth schemes are applicable.
         410  +
    pub fn set_allow_no_auth(&mut self) -> &mut Self {
         411  +
        self.push_runtime_plugin(::aws_smithy_runtime::client::auth::no_auth::NoAuthRuntimePluginV2::new().into_shared());
         412  +
        self
         413  +
    }
  396    414   
    /// Set the auth scheme preference for an auth scheme resolver
  397    415   
    /// (typically the default auth scheme resolver).
  398    416   
    ///
  399    417   
    /// Each operation has a predefined order of auth schemes, as determined by the service,
  400    418   
    /// for auth scheme resolution. By using the auth scheme preference, customers
  401    419   
    /// can reorder the schemes resolved by the auth scheme resolver.
  402    420   
    ///
  403    421   
    /// The preference list is intended as a hint rather than a strict override.
  404    422   
    /// Any schemes not present in the originally resolved auth schemes will be ignored.
  405    423   
    ///
@@ -1214,1232 +1273,1292 @@
 1234   1252   
    {
 1235   1253   
        if config.behavior_version.is_none() {
 1236   1254   
            config.behavior_version = Some(::aws_smithy_runtime_api::client::behavior_version::BehaviorVersion::latest());
 1237   1255   
        }
 1238   1256   
    }
 1239   1257   
 1240   1258   
    let default_retry_partition = "ec2protocol";
 1241   1259   
 1242   1260   
    let scope = "ec2_query";
 1243   1261   
        1262  +
    #[allow(deprecated)]
 1244   1263   
                    let mut plugins = ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins::new()
 1245   1264   
                        // defaults
 1246   1265   
                        .with_client_plugins(::aws_smithy_runtime::client::defaults::default_plugins(
 1247   1266   
                            ::aws_smithy_runtime::client::defaults::DefaultPluginParams::new()
 1248   1267   
                                .with_retry_partition_name(default_retry_partition)
 1249   1268   
                                .with_behavior_version(config.behavior_version.expect("Invalid client configuration: A behavior major version must be set when sending a request or constructing a client. You must set it during client construction or by enabling the `behavior-version-latest` cargo feature."))
 1250   1269   
                        ))
 1251   1270   
                        // user config
 1252   1271   
                        .with_client_plugin(
 1253   1272   
                            ::aws_smithy_runtime_api::client::runtime_plugin::StaticRuntimePlugin::new()

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/config/auth.rs

@@ -71,71 +148,130 @@
   91     91   
    pub fn builder() -> crate::config::auth::ParamsBuilder {
   92     92   
        crate::config::auth::ParamsBuilder::default()
   93     93   
    }
   94     94   
   95     95   
    /// Return the operation name for [`Params`]
   96     96   
    pub fn operation_name(&self) -> &str {
   97     97   
        self.operation_name.as_ref()
   98     98   
    }
   99     99   
}
  100    100   
  101         -
#[cfg(test)]
  102         -
#[derive(Debug)]
  103         -
pub(crate) struct NoAuthSchemeResolver;
  104         -
  105         -
#[cfg(test)]
  106         -
impl ResolveAuthScheme for NoAuthSchemeResolver {
  107         -
    fn resolve_auth_scheme<'a>(
  108         -
        &'a self,
  109         -
        _params: &'a crate::config::auth::Params,
  110         -
        _cfg: &'a ::aws_smithy_types::config_bag::ConfigBag,
  111         -
        _runtime_components: &'a ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponents,
  112         -
    ) -> ::aws_smithy_runtime_api::client::auth::AuthSchemeOptionsFuture<'a> {
  113         -
        ::aws_smithy_runtime_api::client::auth::AuthSchemeOptionsFuture::ready(::std::result::Result::Ok(vec![
  114         -
            ::aws_smithy_runtime_api::client::auth::AuthSchemeOption::from(::aws_smithy_runtime::client::auth::no_auth::NO_AUTH_SCHEME_ID),
  115         -
        ]))
  116         -
    }
  117         -
}
  118         -
  119    101   
#[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug)]
  120    102   
/// Builder for [`Params`]
  121    103   
pub struct ParamsBuilder {
  122    104   
    operation_name: ::std::option::Option<::std::borrow::Cow<'static, str>>,
  123    105   
}
  124    106   
impl ParamsBuilder {
  125    107   
    /// Set the operation name for the builder
  126    108   
    pub fn operation_name(self, operation_name: impl Into<::std::borrow::Cow<'static, str>>) -> Self {
  127    109   
        self.set_operation_name(::std::option::Option::Some(operation_name.into()))
  128    110   
    }

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/empty_input_and_empty_output.rs

@@ -221,221 +281,283 @@
  241    241   
mod empty_input_and_empty_output_test {
  242    242   
  243    243   
    /// Empty input serializes no extra query params
  244    244   
    /// Test ID: Ec2QueryEmptyInputAndEmptyOutput
  245    245   
    #[::tokio::test]
  246    246   
    #[::tracing_test::traced_test]
  247    247   
    async fn ec2_query_empty_input_and_empty_output_request() {
  248    248   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  249    249   
        let config_builder = crate::config::Config::builder()
  250    250   
            .with_test_defaults()
  251         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         251  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         252  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         253  +
            .allow_no_auth()
  252    254   
            .endpoint_url("https://example.com");
  253    255   
  254    256   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  255    257   
        let result = client.empty_input_and_empty_output().send().await;
  256    258   
        let _ = dbg!(result);
  257    259   
        let http_request = request_receiver.expect_request();
  258    260   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  259    261   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  260    262   
        let body = http_request.body().bytes().expect("body should be strict");
  261    263   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/endpoint_operation.rs

@@ -221,221 +281,283 @@
  241    241   
  242    242   
    /// Operations can prepend to the given host if they define the
  243    243   
    /// endpoint trait.
  244    244   
    /// Test ID: Ec2QueryEndpointTrait
  245    245   
    #[::tokio::test]
  246    246   
    #[::tracing_test::traced_test]
  247    247   
    async fn ec2_query_endpoint_trait_request() {
  248    248   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  249    249   
        let config_builder = crate::config::Config::builder()
  250    250   
            .with_test_defaults()
  251         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         251  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         252  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         253  +
            .allow_no_auth()
  252    254   
            .endpoint_url("https://example.com");
  253    255   
  254    256   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  255    257   
        let result = client.endpoint_operation().send().await;
  256    258   
        let _ = dbg!(result);
  257    259   
        let http_request = request_receiver.expect_request();
  258    260   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  259    261   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  260    262   
        let body = http_request.body().bytes().expect("body should be strict");
  261    263   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/endpoint_with_host_label_operation.rs

@@ -244,244 +304,306 @@
  264    264   
    /// Operations can prepend to the given host if they define the
  265    265   
    /// endpoint trait, and can use the host label trait to define
  266    266   
    /// further customization based on user input.
  267    267   
    /// Test ID: Ec2QueryEndpointTraitWithHostLabel
  268    268   
    #[::tokio::test]
  269    269   
    #[::tracing_test::traced_test]
  270    270   
    async fn ec2_query_endpoint_trait_with_host_label_request() {
  271    271   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  272    272   
        let config_builder = crate::config::Config::builder()
  273    273   
            .with_test_defaults()
  274         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         274  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         275  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         276  +
            .allow_no_auth()
  275    277   
            .endpoint_url("https://example.com");
  276    278   
  277    279   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  278    280   
        let result = client
  279    281   
            .endpoint_with_host_label_operation()
  280    282   
            .set_label(::std::option::Option::Some("bar".to_owned()))
  281    283   
            .send()
  282    284   
            .await;
  283    285   
        let _ = dbg!(result);
  284    286   
        let http_request = request_receiver.expect_request();

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/host_with_path_operation.rs

@@ -221,221 +281,283 @@
  241    241   
mod host_with_path_operation_test {
  242    242   
  243    243   
    /// Custom endpoints supplied by users can have paths
  244    244   
    /// Test ID: Ec2QueryHostWithPath
  245    245   
    #[::tokio::test]
  246    246   
    #[::tracing_test::traced_test]
  247    247   
    async fn ec2_query_host_with_path_request() {
  248    248   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  249    249   
        let config_builder = crate::config::Config::builder()
  250    250   
            .with_test_defaults()
  251         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         251  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         252  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         253  +
            .allow_no_auth()
  252    254   
            .endpoint_url("https://example.com/custom");
  253    255   
  254    256   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  255    257   
        let result = client.host_with_path_operation().send().await;
  256    258   
        let _ = dbg!(result);
  257    259   
        let http_request = request_receiver.expect_request();
  258    260   
        let body = http_request.body().bytes().expect("body should be strict");
  259    261   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  260    262   
            body,
  261    263   
            "Action=HostWithPathOperation&Version=2020-01-08",

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/nested_structures.rs

@@ -218,218 +278,280 @@
  238    238   
mod nested_structures_test {
  239    239   
  240    240   
    /// Serializes nested structures using dots
  241    241   
    /// Test ID: Ec2NestedStructures
  242    242   
    #[::tokio::test]
  243    243   
    #[::tracing_test::traced_test]
  244    244   
    async fn ec2_nested_structures_request() {
  245    245   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  246    246   
        let config_builder = crate::config::Config::builder()
  247    247   
            .with_test_defaults()
  248         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         248  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         249  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         250  +
            .allow_no_auth()
  249    251   
            .endpoint_url("https://example.com");
  250    252   
  251    253   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  252    254   
        let result = client
  253    255   
            .nested_structures()
  254    256   
            .set_nested(::std::option::Option::Some(
  255    257   
                crate::types::StructArg::builder()
  256    258   
                    .set_string_arg(::std::option::Option::Some("foo".to_owned()))
  257    259   
                    .set_other_arg(::std::option::Option::Some(true))
  258    260   
                    .set_recursive_arg(::std::option::Option::Some(::std::boxed::Box::new(

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/no_input_and_output.rs

@@ -215,215 +275,277 @@
  235    235   
mod no_input_and_output_test {
  236    236   
  237    237   
    /// No input serializes no payload
  238    238   
    /// Test ID: Ec2QueryNoInputAndOutput
  239    239   
    #[::tokio::test]
  240    240   
    #[::tracing_test::traced_test]
  241    241   
    async fn ec2_query_no_input_and_output_request() {
  242    242   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  243    243   
        let config_builder = crate::config::Config::builder()
  244    244   
            .with_test_defaults()
  245         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         245  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         246  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         247  +
            .allow_no_auth()
  246    248   
            .endpoint_url("https://example.com");
  247    249   
  248    250   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  249    251   
        let result = client.no_input_and_output().send().await;
  250    252   
        let _ = dbg!(result);
  251    253   
        let http_request = request_receiver.expect_request();
  252    254   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  253    255   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  254    256   
        let body = http_request.body().bytes().expect("body should be strict");
  255    257   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/put_with_content_encoding.rs

@@ -224,224 +315,319 @@
  244    244   
mod put_with_content_encoding_test {
  245    245   
  246    246   
    /// Compression algorithm encoding is appended to the Content-Encoding header.
  247    247   
    /// Test ID: SDKAppliedContentEncoding_ec2Query
  248    248   
    #[::tokio::test]
  249    249   
    #[::tracing_test::traced_test]
  250    250   
    async fn sdk_applied_content_encoding_ec2_query_request() {
  251    251   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  252    252   
        let config_builder = crate::config::Config::builder()
  253    253   
            .with_test_defaults()
  254         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         254  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         255  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         256  +
            .allow_no_auth()
  255    257   
            .endpoint_url("https://example.com");
  256    258   
  257    259   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  258    260   
        let result = client.put_with_content_encoding()
  259    261   
        .set_data(
  260    262   
            ::std::option::Option::Some(
  261    263   
                "RjCEL3kBwqPivZUXGiyA5JCujtWgJAkKRlnTEsNYfBRGOS0f7LT6R3bCSOXeJ4auSHzQ4BEZZTklUyj5\n1HEojihShQC2jkQJrNdGOZNSW49yRO0XbnGmeczUHbZqZRelLFKW4xjru9uTuB8lFCtwoGgciFsgqTF8\n5HYcoqINTRxuAwGuRUMoNO473QT0BtCQoKUkAyVaypG0hBZdGNoJhunBfW0d3HWTYlzz9pXElyZhq3C1\n2PDB17GEoOYXmTxDecysmPOdo5z6T0HFhujfeJFIQQ8dirmXcG4F3v0bZdf6AZ3jsiVh6RnEXIPxPbOi\ngIXDWTMUr4Pg3f2LdYCM01eAb2qTdgsEN0MUDhEIfn68I2tnWvcozyUFpg1ez6pyWP8ssWVfFrckREIM\nMb0cTUVqSVSM8bnFiF9SoXM6ZoGMKfX1mT708OYk7SqZ1JlCTkecDJDoR5ED2q2MWKUGR6jjnEV0GtD8\nWJO6AcF0DptY9Hk16Bav3z6c5FeBvrGDrxTFVgRUk8SychzjrcqJ4qskwN8rL3zslC0oqobQRnLFOvwJ\nprSzBIwdH2yAuxokXAdVRa1u9NGNRvfWJfKkwbbVz8yV76RUF9KNhAUmwyYDrLnxNj8ROl8B7dv8Gans\n7Bit52wcdiJyjBW1pAodB7zqqVwtBx5RaSpF7kEMXexYXp9N0J1jlXzdeg5Wgg4pO7TJNr2joiPVAiFf\nefwMMCNBkYx2z7cRxVxCJZMXXzxSKMGgdTN24bJ5UgE0TxyV52RC0wGWG49S1x5jGrvmxKCIgYPs0w3Z\n0I3XcdB0WEj4x4xRztB9Cx2Mc4qFYQdzS9kOioAgNBti1rBySZ8lFZM2zqxvBsJTTJsmcKPr1crqiXjM\noVWdM4ObOO6QA7Pu4c1hT68CrTmbcecjFcxHkgsqdixnFtN6keMGL9Z2YMjZOjYYzbUEwLJqUVWalkIB\nBkgBRqZpzxx5nB5t0qDH35KjsfKM5cinQaFoRq9y9Z82xdCoKZOsUbxZkk1kVmy1jPDCBhkhixkc5PKS\nFoSKTbeK7kuCEZCtR9OfF2k2MqbygGFsFu2sgb1Zn2YdDbaRwRGeaLhswta09UNSMUo8aTixgoYVHxwy\nvraLB6olPSPegeLOnmBeWyKmEfPdbpdGm4ev4vA2AUFuLIeFz0LkCSN0NgQMrr8ALEm1UNpJLReg1ZAX\nzZh7gtQTZUaBVdMJokaJpLk6FPxSA6zkwB5TegSqhrFIsmvpY3VNWmTUq7H0iADdh3dRQ8Is97bTsbwu\nvAEOjh4FQ9wPSFzEtcSJeYQft5GfWYPisDImjjvHVFshFFkNy2nN18pJmhVPoJc456tgbdfEIdGhIADC\n6UPcSSzE1FxlPpILqZrp3i4NvvKoiOa4a8tnALd2XRHHmsvALn2Wmfu07b86gZlu4yOyuUFNoWI6tFvd\nbHnqSJYNQlFESv13gJw609DBzNnrIgBGYBAcDRrIGAnflRKwVDUnDFrUQmE8xNG6jRlyb1p2Y2RrfBtG\ncKqhuGNiT2DfxpY89ektZ98waPhJrFEPJToNH8EADzBorh3T0h4YP1IeLmaI7SOxeuVrk1kjRqMK0rUB\nlUJgJNtCE35jCyoHMwPQlyi78ZaVv8COVQ24zcGpw0MTy6JUsDzAC3jLNY6xCb40SZV9XzG7nWvXA5Ej\nYC1gTXxF4AtFexIdDZ4RJbtYMyXt8LsEJerwwpkfqvDwsiFuqYC6vIn9RoZO5kI0F35XtUITDQYKZ4eq\nWBV0itxTyyR5Rp6g30pZEmEqOusDaIh96CEmHpOBYAQZ7u1QTfzRdysIGMpzbx5gj9Dxm2PO1glWzY7P\nlVqQiBlXSGDOkBkrB6SkiAxknt9zsPdTTsf3r3nid4hdiPrZmGWNgjOO1khSxZSzBdltrCESNnQmlnP5\nZOHA0eSYXwy8j4od5ZmjA3IpFOEPW2MutMbxIbJpg5dIx2x7WxespftenRLgl3CxcpPDcnb9w8LCHBg7\nSEjrEer6Y8wVLFWsQiv6nTdCPZz9cGqwgtCaiHRy8lTWFgdfWd397vw9rduGld3uUFeFRGjYrphqEmHi\nhiG0GhE6wRFVUsGJtvOCYkVREvbEdxPFeJvlAvOcs9HKbtptlTusvYB86vR2bNcIY4f5JZu2X6sGa354\n7LRk0ps2zqYjat3hMR7XDC8KiKceBteFsXoDjfVxTYKelpedTxqWAafrKhaoAVuNM98PSnkuIWGzjSUC\nNsDJTt6vt1D1afBVPWVmnQ7ZQdtEtLIEwAWYjemAztreELIr1E9fPEILm1Ke4KctP9I0I72Dh4eylNZD\n0DEr2Hg7cWFckuZ0Av5d0IPRARXikEGDHl8uh12TXL9v2Uh0ZVSJMEYvxGSbZvkWz8TjWSk3hKA2a7GL\nJm3Ho7e1C34gE1XRGcEthxvURxt4OKBqN3ZNaMIuDTWinoQAutMcUqtm4MoL7RGPiCHUrvTwQPSirsmA\nQmOEu8nOpnP77Fivh9jLGx5ta7nL6jrsWUsBqiN1lzpdPYLRR4mUIAj6sNWiDEk4pkbHSMEcqbWw6Zl7\npsEyPDHalCNhWMA3RSK3skURzQDZ0oBV5W7vjVIZ4d3uCKsk6zrzEI9u5mx7p9RdNKodXfzqYt0ULdtc\n3RW0hIfw2KvrO3BD2QrtgAkfrFBGVvlJSUoh0MvLz8DeXxfuiuq9Ttu7wvsqVI4Piah6WNEXtHHGPJO3\nGhc75Bnv2To4VS2v8rmyKAPIIVTuYBHZN6sZ4FhFzbrslCIdk0eadaU60naqiNWU3CsxplIYGyeThmJ7\n9u4h6Y2OmiPZjFPS2bAzwgAozYTVefII9aEaWZ0hxHZeu1FW7r79dkdO73ZqRfas9u8Z7LLBPCw5pV0F\n5I0pHDgNb6MogoxF4NZJfVtIX1vCHhhVLrXjrYNJU2fD9Fw8kT8Ie2HDBJnqAvYKmryQ1r9ulo3Me3rH\nq9s2Y5uCDxu9iQNhnpwIm57WYGFeqd2fnQeY2IziD3Jgx0KSrmOH0jgi0RwJyfGXaORPq3bQQqljuACo\nkO6io9t5VI8PbNxSHTRbtYiPciUslbT0g7SpCLrRPOBRJ4DDk56pjghpeoUagJ5xJ4wjBzBuXnAGkNnP\nTfpiuz2r3oSBAi8sB9wiYK2z9sp4gZyQsqdVNzAEgKatOxBRBmJCBYpjO98ZQrF83XApPpfFg0ujB2PW\n1iYF9NkgwIKB5oB6KVTOmSKJk11mVermPgeugHbzdd2zUP6fP8fWbhseqk2t8ahGvqjs2CDHFIWXl5jc\nfCknbykE3ANt7lnAfJQ2ddduLGiqrX4HWx6jcWw08Es6BkleO0IDbaWrb95d5isvFlzJsf0TyDIXF4uq\nbBDCi0XPWqtRJ2iqmnJa2GbBe9GmAOWMkBFSilMyC4sR395WSDpD56fx0NGoU6cHrRu9xF2Bgh7RGSfl\nch2GXEeE02fDpSHFNvJBlOEqqfkIX6oCa6KY9NThqeIjYsT184XR2ZI7akXRaw1gMOGpk4FmUxk6WIuX\n4ei1SLQgSdl7OEdRtJklZ76eFrMbkJQ2TDhu8f7mVuiy53GUMIvCrP9xYGZGmCIDm2e4U2BDi3F7C5xK\n3bDZXwlQp6z4BSqTy2OVEWxXUJfjPMOL5Mc7AvDeKtxAS73pVIv0HgHIa4NBAdC7uLG0zXuu1FF6z2XY\nyUhk03fMZhYe7vVxsul3WE7U01fuN8z2y0eKwBW1RFBE1eKIaR9Y01sIWQWbSrfHfDrdZiElhmhHehfs\n0EfrR4sLYdQshJuvhTeKGJDaEhtPQwwJ9mUYGtuCL9RozWx1XI4bHNlzBTW0BVokYiJGlPe7wdxNzJD7\nJgS7Lwv6jGKngVf86imGZyzqwiteWFPdNUoWdTvUPSMO5xIUK9mo5QpwbBOAmyYzVq42o3Qs90N9khEV\nU36LB99fw8PtGHH5wsCHshfauwnNPj0blGXzke0kQ4JNCVH7Jtn0Y0aeejkSxFtwtxoYs6zHl1Lxxpsd\nsw5vBy49CEtoltDW367lVAwDjWdx20msGB7qJCkEDrzu7EXSO22782QX9NBRcN9ppX0C25I0FMA4Wnhz\n9zIpiXRrsTH35jzM8Cjt4EVLGNU3O0HuEvAer3cENnMJtngdrT86ox3fihMQbiuy4Bh4DEcP5in2VjbT\n3qbnoCNvOi8Fmmf7KlGlWAOceL5OHVE5lljjQEMzEQOCEgrk5mDKgwSBJQBNauIDSC1a5iEQjB8Xxp4C\nqeKyyWY9IOntNrtU5ny4lNprHJd36dKFeBLKcGCOvgHBXdOZloMF0YTRExw7hreEO9IoTGVHJ4teWsNr\nHdtagUHjkeZkdMMfnUGNv5aBNtFMqhcZH6EitEa9lGPkKBbJpoom3u8D8EHSIF1H5EZqqx9TLY5hWAIG\nPwJ4qwkpCGw5rCLVrjw7ARKukIFzNULANqjHUMcJ002TlUosJM4xJ4aAgckpLVGOGuPDhGAAexEcQmbg\nUsZdmqQrtuVUyyLteLbLbqtR6CTlcAIwY3xyMCmPgyefE0FEUODBoxQtRUuYTL9RC5o1sYb2PvcxUQfb\niJFi2CAl99pAzcckU2qVCxniARslIxM5pmMRGsQX9ZzYAfZrbg6ce6S74I8UMlgRQ2QVyvUjKKOE6IrJ\nLng370emHfe5m6LZULD5YiZutkD5ipjL2Bz77DvTE5kNPUhuoKBcTJcUgytfXAKUTWOcRKNlq0GImrxM\nJfr7AWbLFFNKGLeTrVDBwpcokJCv0zcOKWe8fd2xkeXkZTdmM66IgM27cyYmtQ6YF26Kd0qrWJeVZJV9\n3fyLYYvKN5csbRY2BHoYE5ERARRW65IrpkXMf48OrCXMtDIP0Z7wxI9DiTeKKeH4uuguhCJnwzR3WxLA\nVU6eBJEd7ZjS6JA83w7decq8uDI7LGKjcz1FySp3B7fE9DkHRGXxbsL7Fjar6vW2mAv8CuvI20B6jctp\n2yLDs24sPfB3sSxrrlhbuT1m6DZqiN0dl6umKx7NGZhmOTVGr20jfcxhqPQwTJfd7kel4rvxip4BqkvT\n7STy8knJ2BXGyJeNgwo1PXUZRDVy0LCTsSF1RFuRZe8cktHl9lgw8ntdPn1pVFL0MwJkJfdXBNUp5gNv\n50FTkrpo1t6wq4CVbcfj2XOrOzvBUzNH26sXGABI1gGxCdp2jEZrHgqQaWIaTJVTuguZhxqDvdYsrwFW\nYN58uuNcKHIrGdRSigyZInwQDYk0pjcqdSeU0WVU3Y9htzZBR7XRaCJr5YTZvq7fwermb5tuwb37lPLq\nB2IGg0iftkVbXaSyfCwVaRbfLBb88so0QqpmJGirFu8FcDiXOV1zTr8yW9XLdYQuUjh43xrXLdgsuYff\nCagInUk1eU1aLjVZoJRsNmStmOEpAqlYMwTvx7w6j2f421Cxr5cNZBIVlAxlXN2QiDqJ9v3sHhHkTanc\nlQuH8ptUyX8qncpBuXXBn7cSez9N0EoxCBl1GHUagbjstgJo4gzLvTmVIY6MiWYOBitzNUHfyqKwtKUr\nVoSCdZcGeA9lHUPA7PUprRRaT3m1hGKPyshtVS2ikG48w3oVerln1N1qGdtz46gZCrndw3LZ1B362RfW\nzDPuXbpsyLsRMTt1Rz1oKHRXp3iE41hkhQH6pxlvyCW2INnHt5XU8zRamOB3oW0udOhMpQFDjRkOcy06\nb4t0QTHvoRqmBna3WXzIMZyeK3GChF5eF8oDXRbjhk7BB6YKCgqwWUzEJ5K47HMSlhFkBUjaPRjdGM0z\nzOMwhW6b1NvSwP7XM1P5yi1oPvOspts1vr29SXqrMMrBhVogeodWyd69NqrO4jkyBxKmlXifoTowpfiY\n2cUCE0XMZqxUN39LCP09JqZifaEcBEo3mgtm1tWu5QR2GNq7UyQf4RIPSDOpDCAtwoPhRgdT1lJdcj4U\nlnH0wrJ8Uwu7c08L7ErnIrDATqCrOjpSbzGP1xHENABYONC4TknFPrJ8pe40A8fzGT0qBw9mAM1SKcHO\nfoiLcMC9AjHTqJzDG3xplSLPG9or2rMeq7Fzp9r0y7uJRMxgg51EbjfvYlH466A3ggvL2WQlDXjJqPW3\nBJGWAWDNN9LK8f46bADKPxakpkx23S9O47rGSXfDhVSIZsDympxWX1UOzWwMZRHkofVeKqizgbKkGgUT\nWykE9gRoRAOd9wfHZDYKa9i0LaPDiaUMvnU1gdBIqIoiVsdJ9swX47oxvMtOxtcS0zlD6llDkBuIiU5g\nPwRCYmtkkb25c8iRJXwGFPjI1wJ34I1z1ENicPdosPiUe9ZC2jnXIKzEdv01x2ER7DNDF3yxOwOhxNxI\nGqsmC92j25UQQFu9ZstOZ28AoCkuOYs0Uycm5u8jR1T39dMBwrko09rC65ENLnsxM8oebmyFCPiGJ1ED\n5Xqc9qZ237f1OnETAoEOwqUSvrdPTv56U7hV91EMTyC812MLQpr2710E3VVpsUCUMNhIxdt7UXZ1UNFb\njgzpZLXnf4DHrv6B7kq6UI50KMxcw1HZE2GpODfUTzNFLaqdrvzxKe5eUWdcojBaRbD4fFdVYJTElYDH\nNNVh6ofkoeWcs9CWGFmSBe0T4K8phFeygQg0prKMELNEy6qENzVtG9ZDcqj3a7L6ZLtvq50anWp7fAVu\nfwz55g4iM2Z2fA0pnwHDL7tt67zTxGITvsnJsZSpeq1EQsZcwtkBV9liu7Rl7jiVT1IIRtchB8TsTiaA\nwVHIQQ9RIOTiPQdKNqi1kC9iGlUqWK93gblNWlBw1eYB9Wk8FQogutwTf0caNMx8D4nPbANcmOOlskIy\nzALh15OlTrWnhP95rf08AN2J026zDE2DUF9k0eCevYBQIDjqKNW4XCZnjbHoIcKzbY5VzPbMs3ZyMz8K\nSucBmgPg6wrSK5ykbkapS5vuqvXc9GbjQJ8bPNzoxoWGyjbZvDs2OBrIqBmcQb2DLJ8v38McQ4mC4UsS\njf4PyfSCtpk274QZjvLCZbLiCBxQegk7jUU0NmTFJAcYCxd9xMWdlFkiszcltT2YzwuFFz7iA6aa4n5L\nHpBNfUA01GcAi1aCMYhmooS4zSlYcSOZkovMz36U3Fd9WtqIEOJLi7HMgHQDgNMdK6DTzAdHQtxerxVF\nHJnPrfNVG7270r3bp0bPnLNYLhObbAn6zqSAUeLtI2Y4KJDjBKCAh2vvYGbu0e2REYJWRj7MkGevsSSy\nb1kCXLt6tKGWAb7lt5c0xyJgUIJW7pdtnwgT0ZCa24BecCAwNnG5U2EwQbcjZGsFxqNGfaemd3oFEhES\nBaE0Fxms9UKTnMafu8wvZ2xymMrUduuRzOjDeX7oD5YsLC88V8CGMLxbbxIpt94KGykbr6e7L0R4oZl1\ntKMgFwQ2p9Txdbp0Y293LcsJymKizqI0F2xEp7y4SmWOJqHZtsbz80wVV9nv41CvtfxuSoGZJ5cNB7pI\nBgzNcQCeH3Jt0RaGGwboxxpuFbzilmkMFXxJm87tD4WNgu01nHfGCKeQcySEBZpVfJgi6sDFJ8uWnvKm\n9mPLHurtWzEfKqUEa1iC71bXjw5wrvhv9BYW8JSUELHmDquftQyKdq0DZXhULMHGQLf4e95WIaoA14LL\nbThz77kuhKULPTu2MNrBUKGorurhGugo5gs4ZUezSsUOe3KxYdrFMdGgny1GgTxMSMTp2RAZytKjv4kQ\nVx7XgzvpQLIbDjUPAkJv6lScwIRq1W3Ne0Rh0V6Bmn6U5uIuWnJjULmbaQiSODj3z0mAZvak0mSWIGwT\nTX83HztcC4W7e1f6a1thmcc5K61Icehla2hBELWPpixTkyC4eEVmk9Rq0m0ZXtx0JX2ZQXqXDEyePyMe\nJ70sdSzXk72zusqhY4yuOMGgbYNHqxOToK6NxujR7e4dV3Wk5JnSUthym8scjcPeCiKDNY4cHfTMnDXJ\n9zLVy01LtNKYpJ1s8FxVxigmxQNKEbIamxhx6yqwGC4aiISVOOUEjvNOdaUfXfUsE6jEwtwxyGxjlRK1\ncLyxXttq4QWN6PehgHv7jXykzPjInbEysebFvvPOOMdunmJvcCNMSvjUda8fL6xfGo0FDrLg8XZipd6S\noPVdYtyIM1Dg40KbBA3JuumPYtXuJaHrZnjZmdnM5OVo4ZNxktfCVT0c6bnD4bAeyn4bYt1ZPaX6hQHh\nJtvNYfpD0ONYlmqKuToQAMlz52Fh6bj45EbX89L5eLlSpWeyBlGotzriB0EPlclrGi5l2B5oPb1aB1ag\nyyYuu44l0F1oOVYnBIZsxIsHVITxi9lEuVPFkWASOUNuVQXfM4n5hxWR9qtuKnIcPsvbJsv1U10XlKh3\nKisqPhHU15xrCLr5gwFxPUKiNTLUBrkzgBOHXPVsHcLCiSD0YU56TRGfvEom43TWUKPPfl9Z54tgVQuT\njCRlaljAzeniQIcbbHZnn3f0HxbDG3DFYqWSxNrXabHhRsIOhhUHSPENyhGSTVO5t0XX5CdMspJPCd02\n3Oqv32ccbUK4O3YH6LEvp0WO3kSl5n50odVkI9B0i0iq4UPFGMkM8bEQJbgJoOH71P10vtdevJFQE4g2\nyhimiM53ZJRWgSZveHtENZc0Gjo0F9eioak9BnPpY1QxAFPC817svuhEstcU69bLCA4D1rO5R8AuIIBq\nyQJcifFLvbpAEYTLKJqysZrU8EEl3TSdC13A9hZvk4NC8VGEDAxcNrKw313dZp17kZPO5HSd1y6sljAW\nA9M1d6FMYV5SlBWf3WZNCUPS7qKNlda2YBsC6IUVB363f5RLGQOQHwbaijBSRCkrVoRxBHtc0Bd5J9V9\nP5uMTXkpZOxRcCQvImGgcmGuxxLb5zTqfS2xu7v3Sf3IIesSt9tVzcEcdbEvLGVJkLk4mb3G30DbIbri\nPZ09JkweDvMaQ3bxT2nfkz3Ilihkw9jqikkCCCz7E8h6z6KbhQErEW9VzJZzMCgJsyPjFam6iNwpe07S\nhyOvNVw2t9wpzL5xM11DvVzQwDaWEytNRHzDBs4KwEtpI2IpjUyVZHSwA0UGqqkzoCgrJFlNOvPlXqcS\nIcREouUIBmuttkrhPWJtSxOOgpsdvBR3kTOzAXNzSKxoaBAb0c5SDMUc6FIyGA8x5wg5DkUgjFUUodEt\nOYaB2VHVePW9mxHeBTdKWLzJow4ZZvjnoBuVigXljKCNh137ckV2y3Yg3Xi4UzJEI2V5Rw9AfnMs7xUw\nVHOFCg189maD3bmZAe7b4eaGZhyy4HVKjqCXmIH7vsEjRvbnfB0SQxxpuqBDJbHNCtW4vM643ZQQBVPP\na7oXSQIq9w2dHp0A7dtkocCZdQp9FKR9XdJAFIbVSHzIF1ZogeZlc0pXuNE0tagvD57xwDRFkAuoQyMu\nYDdZasXrpSmEE5UjHVkyYsISn8QsfXurzDybX468aoRoks654jjmRY5zi1oB8TcMdC2c3sicNaqfeuhd\nH1nPX7l4RpdqWMR7gGx9slXtG8S3KxpOi4qCD7yg3saD66nun4dzksQURoTUdXyrJR5UpHsfIlTF1aJa\nMdXyQtQnrkl00TeghQd00rRFZsCnhi0qrCSKiBfB2EVrd9RPpbgwJGZHuIQecdBmNetc2ylSEClqVBPR\nGOPPIxrnswEZjmnS0jxKW9VSM1QVxSPJnPFswCqT95SoKD6CP4xdX28WIUGiNaIKodXXJHEIsXBCxLsr\nPwWPCtoplC6hhpKmW5dQo92iCTyY2KioKzO8XR6FKm6qonMKVEwQNtlYE9c97KMtEnp25VOdMP46SQXS\nYsSVp7vm8LP87VYI8SOKcW3s2oedYFtt45rvDzoTF0GmS6wELQ9uo98HhjQAI1Dt91cgjJOwygNmLoZE\nX5K2zQiNA163uMCl5xzaBqY4YTL0wgALg3IFdYSp0RFYLWdt6IxoGI1tnoxcjlUEPo5eGIc3mS3SmaLn\nOdumfUQQ4Jgmgaa5anUVQsfBDrlAN5oaX7O0JO71SSPSWiHBsT9WIPy2J1Cace9ZZLRxblFPSXcvsuHh\nhvnhWQltEDAe7MgvkFQ8lGVFa8jhzijoF9kLmMhMILSzYnfXnZPNP7TlAAwlLHK1RqlpHskJqb6CPpGP\nQvOAhEMsM3zJ2KejZx0esxkjxA0ZufVvGAMN3vTUMplQaF4RiQkp9fzBXf3CMk01dWjOMMIEXTeKzIQe\nEcffzjixWU9FpAyGp2rVl4ETRgqljOGw4UgK31r0ZIEGnH0xGz1FtbW1OcQM008JVujRqulCucEMmntr\n".to_owned()
  262    264   
            )
  263    265   
        )
  264    266   
        .send().await;
  265    267   
        let _ = dbg!(result);
  266    268   
        let http_request = request_receiver.expect_request();
  267    269   
        let expected_headers = [("Content-Encoding", "gzip")];
  268    270   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  269    271   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  270    272   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  271    273   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  272    274   
    }
  273    275   
  274    276   
    /// Compression algorithm encoding is appended to the Content-Encoding header, and the
  275    277   
    /// user-provided content-encoding is NOT in the Content-Encoding header since HTTP binding
  276    278   
    /// traits are ignored in the ec2Query protocol.
  277    279   
    ///
  278    280   
    /// Test ID: SDKAppendsGzipAndIgnoresHttpProvidedEncoding_ec2Query
  279    281   
    #[::tokio::test]
  280    282   
    #[::tracing_test::traced_test]
  281    283   
    async fn sdk_appends_gzip_and_ignores_http_provided_encoding_ec2_query_request() {
  282    284   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  283    285   
        let config_builder = crate::config::Config::builder()
  284    286   
            .with_test_defaults()
  285         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         287  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         288  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         289  +
            .allow_no_auth()
  286    290   
            .endpoint_url("https://example.com");
  287    291   
  288    292   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  289    293   
        let result = client.put_with_content_encoding()
  290    294   
        .set_encoding(
  291    295   
            ::std::option::Option::Some(
  292    296   
                "custom".to_owned()
  293    297   
            )
  294    298   
        )
  295    299   
        .set_data(

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/query_idempotency_token_auto_fill.rs

@@ -232,232 +322,326 @@
  252    252   
mod query_idempotency_token_auto_fill_test {
  253    253   
  254    254   
    /// Automatically adds idempotency token when not set
  255    255   
    /// Test ID: Ec2ProtocolIdempotencyTokenAutoFill
  256    256   
    #[::tokio::test]
  257    257   
    #[::tracing_test::traced_test]
  258    258   
    async fn ec2_protocol_idempotency_token_auto_fill_request() {
  259    259   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  260    260   
        let config_builder = crate::config::Config::builder()
  261    261   
            .with_test_defaults()
  262         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         262  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         263  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         264  +
            .allow_no_auth()
  263    265   
            .endpoint_url("https://example.com");
  264    266   
  265    267   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  266    268   
        let result = client.query_idempotency_token_auto_fill().send().await;
  267    269   
        let _ = dbg!(result);
  268    270   
        let http_request = request_receiver.expect_request();
  269    271   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  270    272   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  271    273   
        let required_headers = &["Content-Length"];
  272    274   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  273    275   
        let body = http_request.body().bytes().expect("body should be strict");
  274    276   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  275    277   
            body,
  276    278   
            "Action=QueryIdempotencyTokenAutoFill&Version=2020-01-08&Token=00000000-0000-4000-8000-000000000000",
  277    279   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  278    280   
        ));
  279    281   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  280    282   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  281    283   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  282    284   
    }
  283    285   
  284    286   
    /// Uses the given idempotency token as-is
  285    287   
    /// Test ID: Ec2ProtocolIdempotencyTokenAutoFillIsSet
  286    288   
    #[::tokio::test]
  287    289   
    #[::tracing_test::traced_test]
  288    290   
    async fn ec2_protocol_idempotency_token_auto_fill_is_set_request() {
  289    291   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  290    292   
        let config_builder = crate::config::Config::builder()
  291    293   
            .with_test_defaults()
  292         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         294  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         295  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         296  +
            .allow_no_auth()
  293    297   
            .endpoint_url("https://example.com");
  294    298   
  295    299   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  296    300   
        let result = client
  297    301   
            .query_idempotency_token_auto_fill()
  298    302   
            .set_token(::std::option::Option::Some("00000000-0000-4000-8000-000000000123".to_owned()))
  299    303   
            .send()
  300    304   
            .await;
  301    305   
        let _ = dbg!(result);
  302    306   
        let http_request = request_receiver.expect_request();

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/query_lists.rs

@@ -215,215 +407,417 @@
  235    235   
mod query_lists_test {
  236    236   
  237    237   
    /// Serializes query lists. All EC2 lists are flattened.
  238    238   
    /// Test ID: Ec2Lists
  239    239   
    #[::tokio::test]
  240    240   
    #[::tracing_test::traced_test]
  241    241   
    async fn ec2_lists_request() {
  242    242   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  243    243   
        let config_builder = crate::config::Config::builder()
  244    244   
            .with_test_defaults()
  245         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         245  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         246  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         247  +
            .allow_no_auth()
  246    248   
            .endpoint_url("https://example.com");
  247    249   
  248    250   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  249    251   
        let result = client
  250    252   
            .query_lists()
  251    253   
            .set_list_arg(::std::option::Option::Some(vec!["foo".to_owned(), "bar".to_owned(), "baz".to_owned()]))
  252    254   
            .set_complex_list_arg(::std::option::Option::Some(vec![
  253    255   
                crate::types::GreetingStruct::builder()
  254    256   
                    .set_hi(::std::option::Option::Some("hello".to_owned()))
  255    257   
                    .build(),
  256    258   
                crate::types::GreetingStruct::builder()
  257    259   
                    .set_hi(::std::option::Option::Some("hola".to_owned()))
  258    260   
                    .build(),
  259    261   
            ]))
  260    262   
            .send()
  261    263   
            .await;
  262    264   
        let _ = dbg!(result);
  263    265   
        let http_request = request_receiver.expect_request();
  264    266   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  265    267   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  266    268   
        let body = http_request.body().bytes().expect("body should be strict");
  267    269   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  268    270   
            body,
  269    271   
            "Action=QueryLists&Version=2020-01-08&ListArg.1=foo&ListArg.2=bar&ListArg.3=baz&ComplexListArg.1.Hi=hello&ComplexListArg.2.Hi=hola",
  270    272   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  271    273   
        ));
  272    274   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  273    275   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  274    276   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  275    277   
    }
  276    278   
  277    279   
    /// Does not serialize empty query lists.
  278    280   
    /// Test ID: Ec2EmptyQueryLists
  279    281   
    #[::tokio::test]
  280    282   
    #[::tracing_test::traced_test]
  281    283   
    async fn ec2_empty_query_lists_request() {
  282    284   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  283    285   
        let config_builder = crate::config::Config::builder()
  284    286   
            .with_test_defaults()
  285         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         287  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         288  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         289  +
            .allow_no_auth()
  286    290   
            .endpoint_url("https://example.com");
  287    291   
  288    292   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  289    293   
        let result = client.query_lists().set_list_arg(::std::option::Option::Some(vec![])).send().await;
  290    294   
        let _ = dbg!(result);
  291    295   
        let http_request = request_receiver.expect_request();
  292    296   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  293    297   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  294    298   
        let body = http_request.body().bytes().expect("body should be strict");
  295    299   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  296    300   
            body,
  297    301   
            "Action=QueryLists&Version=2020-01-08",
  298    302   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  299    303   
        ));
  300    304   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  301    305   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  302    306   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  303    307   
    }
  304    308   
  305    309   
    /// An xmlName trait in the member of a list has no effect on the list serialization.
  306    310   
    /// Test ID: Ec2ListArgWithXmlNameMember
  307    311   
    #[::tokio::test]
  308    312   
    #[::tracing_test::traced_test]
  309    313   
    async fn ec2_list_arg_with_xml_name_member_request() {
  310    314   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  311    315   
        let config_builder = crate::config::Config::builder()
  312    316   
            .with_test_defaults()
  313         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         317  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         318  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         319  +
            .allow_no_auth()
  314    320   
            .endpoint_url("https://example.com");
  315    321   
  316    322   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  317    323   
        let result = client
  318    324   
            .query_lists()
  319    325   
            .set_list_arg_with_xml_name_member(::std::option::Option::Some(vec!["A".to_owned(), "B".to_owned()]))
  320    326   
            .send()
  321    327   
            .await;
  322    328   
        let _ = dbg!(result);
  323    329   
        let http_request = request_receiver.expect_request();
  324    330   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  325    331   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  326    332   
        let body = http_request.body().bytes().expect("body should be strict");
  327    333   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  328    334   
            body,
  329    335   
            "Action=QueryLists&Version=2020-01-08&ListArgWithXmlNameMember.1=A&ListArgWithXmlNameMember.2=B",
  330    336   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  331    337   
        ));
  332    338   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  333    339   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  334    340   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  335    341   
    }
  336    342   
  337    343   
    /// Changes the name of the list using the xmlName trait
  338    344   
    /// Test ID: Ec2ListMemberWithXmlName
  339    345   
    #[::tokio::test]
  340    346   
    #[::tracing_test::traced_test]
  341    347   
    async fn ec2_list_member_with_xml_name_request() {
  342    348   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  343    349   
        let config_builder = crate::config::Config::builder()
  344    350   
            .with_test_defaults()
  345         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         351  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         352  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         353  +
            .allow_no_auth()
  346    354   
            .endpoint_url("https://example.com");
  347    355   
  348    356   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  349    357   
        let result = client
  350    358   
            .query_lists()
  351    359   
            .set_list_arg_with_xml_name(::std::option::Option::Some(vec!["A".to_owned(), "B".to_owned()]))
  352    360   
            .send()
  353    361   
            .await;
  354    362   
        let _ = dbg!(result);
  355    363   
        let http_request = request_receiver.expect_request();
  356    364   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  357    365   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  358    366   
        let body = http_request.body().bytes().expect("body should be strict");
  359    367   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  360    368   
            body,
  361    369   
            "Action=QueryLists&Version=2020-01-08&Hi.1=A&Hi.2=B",
  362    370   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  363    371   
        ));
  364    372   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  365    373   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  366    374   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  367    375   
    }
  368    376   
  369    377   
    /// Nested structure with a list member
  370    378   
    /// Test ID: Ec2ListNestedStructWithList
  371    379   
    #[::tokio::test]
  372    380   
    #[::tracing_test::traced_test]
  373    381   
    async fn ec2_list_nested_struct_with_list_request() {
  374    382   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  375    383   
        let config_builder = crate::config::Config::builder()
  376    384   
            .with_test_defaults()
  377         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         385  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         386  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         387  +
            .allow_no_auth()
  378    388   
            .endpoint_url("https://example.com");
  379    389   
  380    390   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  381    391   
        let result = client
  382    392   
            .query_lists()
  383    393   
            .set_nested_with_list(::std::option::Option::Some(
  384    394   
                crate::types::NestedStructWithList::builder()
  385    395   
                    .set_list_arg(::std::option::Option::Some(vec!["A".to_owned(), "B".to_owned()]))
  386    396   
                    .build(),
  387    397   
            ))

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/query_timestamps.rs

@@ -218,218 +278,280 @@
  238    238   
mod query_timestamps_test {
  239    239   
  240    240   
    /// Serializes timestamps
  241    241   
    /// Test ID: Ec2TimestampsInput
  242    242   
    #[::tokio::test]
  243    243   
    #[::tracing_test::traced_test]
  244    244   
    async fn ec2_timestamps_input_request() {
  245    245   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  246    246   
        let config_builder = crate::config::Config::builder()
  247    247   
            .with_test_defaults()
  248         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         248  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         249  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         250  +
            .allow_no_auth()
  249    251   
            .endpoint_url("https://example.com");
  250    252   
  251    253   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  252    254   
        let result = client
  253    255   
            .query_timestamps()
  254    256   
            .set_normal_format(::std::option::Option::Some(::aws_smithy_types::DateTime::from_fractional_secs(
  255    257   
                1422172800, 0_f64,
  256    258   
            )))
  257    259   
            .set_epoch_member(::std::option::Option::Some(::aws_smithy_types::DateTime::from_fractional_secs(
  258    260   
                1422172800, 0_f64,

tmp-codegen-diff/codegen-client-test/ec2_query/rust-client-codegen/src/operation/simple_input_params.rs

@@ -218,218 +688,714 @@
  238    238   
mod simple_input_params_test {
  239    239   
  240    240   
    /// Serializes strings
  241    241   
    /// Test ID: Ec2SimpleInputParamsStrings
  242    242   
    #[::tokio::test]
  243    243   
    #[::tracing_test::traced_test]
  244    244   
    async fn ec2_simple_input_params_strings_request() {
  245    245   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  246    246   
        let config_builder = crate::config::Config::builder()
  247    247   
            .with_test_defaults()
  248         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         248  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         249  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         250  +
            .allow_no_auth()
  249    251   
            .endpoint_url("https://example.com");
  250    252   
  251    253   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  252    254   
        let result = client
  253    255   
            .simple_input_params()
  254    256   
            .set_foo(::std::option::Option::Some("val1".to_owned()))
  255    257   
            .set_bar(::std::option::Option::Some("val2".to_owned()))
  256    258   
            .send()
  257    259   
            .await;
  258    260   
        let _ = dbg!(result);
  259    261   
        let http_request = request_receiver.expect_request();
  260    262   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  261    263   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  262    264   
        let required_headers = &["Content-Length"];
  263    265   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  264    266   
        let body = http_request.body().bytes().expect("body should be strict");
  265    267   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  266    268   
            body,
  267    269   
            "Action=SimpleInputParams&Version=2020-01-08&Foo=val1&Bar=val2",
  268    270   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  269    271   
        ));
  270    272   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  271    273   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  272    274   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  273    275   
    }
  274    276   
  275    277   
    /// Serializes booleans that are true
  276    278   
    /// Test ID: Ec2SimpleInputParamsStringAndBooleanTrue
  277    279   
    #[::tokio::test]
  278    280   
    #[::tracing_test::traced_test]
  279    281   
    async fn ec2_simple_input_params_string_and_boolean_true_request() {
  280    282   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  281    283   
        let config_builder = crate::config::Config::builder()
  282    284   
            .with_test_defaults()
  283         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         285  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         286  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         287  +
            .allow_no_auth()
  284    288   
            .endpoint_url("https://example.com");
  285    289   
  286    290   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  287    291   
        let result = client
  288    292   
            .simple_input_params()
  289    293   
            .set_foo(::std::option::Option::Some("val1".to_owned()))
  290    294   
            .set_baz(::std::option::Option::Some(true))
  291    295   
            .send()
  292    296   
            .await;
  293    297   
        let _ = dbg!(result);
  294    298   
        let http_request = request_receiver.expect_request();
  295    299   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  296    300   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  297    301   
        let required_headers = &["Content-Length"];
  298    302   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  299    303   
        let body = http_request.body().bytes().expect("body should be strict");
  300    304   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  301    305   
            body,
  302    306   
            "Action=SimpleInputParams&Version=2020-01-08&Foo=val1&Baz=true",
  303    307   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  304    308   
        ));
  305    309   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  306    310   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  307    311   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  308    312   
    }
  309    313   
  310    314   
    /// Serializes booleans that are false
  311    315   
    /// Test ID: Ec2SimpleInputParamsStringsAndBooleanFalse
  312    316   
    #[::tokio::test]
  313    317   
    #[::tracing_test::traced_test]
  314    318   
    async fn ec2_simple_input_params_strings_and_boolean_false_request() {
  315    319   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  316    320   
        let config_builder = crate::config::Config::builder()
  317    321   
            .with_test_defaults()
  318         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         322  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         323  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         324  +
            .allow_no_auth()
  319    325   
            .endpoint_url("https://example.com");
  320    326   
  321    327   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  322    328   
        let result = client.simple_input_params().set_baz(::std::option::Option::Some(false)).send().await;
  323    329   
        let _ = dbg!(result);
  324    330   
        let http_request = request_receiver.expect_request();
  325    331   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  326    332   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  327    333   
        let required_headers = &["Content-Length"];
  328    334   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  329    335   
        let body = http_request.body().bytes().expect("body should be strict");
  330    336   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  331    337   
            body,
  332    338   
            "Action=SimpleInputParams&Version=2020-01-08&Baz=false",
  333    339   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  334    340   
        ));
  335    341   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  336    342   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  337    343   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  338    344   
    }
  339    345   
  340    346   
    /// Serializes integers
  341    347   
    /// Test ID: Ec2SimpleInputParamsInteger
  342    348   
    #[::tokio::test]
  343    349   
    #[::tracing_test::traced_test]
  344    350   
    async fn ec2_simple_input_params_integer_request() {
  345    351   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  346    352   
        let config_builder = crate::config::Config::builder()
  347    353   
            .with_test_defaults()
  348         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         354  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         355  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         356  +
            .allow_no_auth()
  349    357   
            .endpoint_url("https://example.com");
  350    358   
  351    359   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  352    360   
        let result = client.simple_input_params().set_bam(::std::option::Option::Some(10)).send().await;
  353    361   
        let _ = dbg!(result);
  354    362   
        let http_request = request_receiver.expect_request();
  355    363   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  356    364   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  357    365   
        let required_headers = &["Content-Length"];
  358    366   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  359    367   
        let body = http_request.body().bytes().expect("body should be strict");
  360    368   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  361    369   
            body,
  362    370   
            "Action=SimpleInputParams&Version=2020-01-08&Bam=10",
  363    371   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  364    372   
        ));
  365    373   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  366    374   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  367    375   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  368    376   
    }
  369    377   
  370    378   
    /// Serializes floats
  371    379   
    /// Test ID: Ec2SimpleInputParamsFloat
  372    380   
    #[::tokio::test]
  373    381   
    #[::tracing_test::traced_test]
  374    382   
    async fn ec2_simple_input_params_float_request() {
  375    383   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  376    384   
        let config_builder = crate::config::Config::builder()
  377    385   
            .with_test_defaults()
  378         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         386  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         387  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         388  +
            .allow_no_auth()
  379    389   
            .endpoint_url("https://example.com");
  380    390   
  381    391   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  382    392   
        let result = client.simple_input_params().set_boo(::std::option::Option::Some(10.8_f64)).send().await;
  383    393   
        let _ = dbg!(result);
  384    394   
        let http_request = request_receiver.expect_request();
  385    395   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  386    396   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  387    397   
        let required_headers = &["Content-Length"];
  388    398   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  389    399   
        let body = http_request.body().bytes().expect("body should be strict");
  390    400   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  391    401   
            body,
  392    402   
            "Action=SimpleInputParams&Version=2020-01-08&Boo=10.8",
  393    403   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  394    404   
        ));
  395    405   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  396    406   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  397    407   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  398    408   
    }
  399    409   
  400    410   
    /// Blobs are base64 encoded in the query string
  401    411   
    /// Test ID: Ec2SimpleInputParamsBlob
  402    412   
    #[::tokio::test]
  403    413   
    #[::tracing_test::traced_test]
  404    414   
    async fn ec2_simple_input_params_blob_request() {
  405    415   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  406    416   
        let config_builder = crate::config::Config::builder()
  407    417   
            .with_test_defaults()
  408         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         418  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         419  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         420  +
            .allow_no_auth()
  409    421   
            .endpoint_url("https://example.com");
  410    422   
  411    423   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  412    424   
        let result = client
  413    425   
            .simple_input_params()
  414    426   
            .set_qux(::std::option::Option::Some(::aws_smithy_types::Blob::new("value")))
  415    427   
            .send()
  416    428   
            .await;
  417    429   
        let _ = dbg!(result);
  418    430   
        let http_request = request_receiver.expect_request();
  419    431   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  420    432   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  421    433   
        let required_headers = &["Content-Length"];
  422    434   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  423    435   
        let body = http_request.body().bytes().expect("body should be strict");
  424    436   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  425    437   
            body,
  426    438   
            "Action=SimpleInputParams&Version=2020-01-08&Qux=dmFsdWU%3D",
  427    439   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  428    440   
        ));
  429    441   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  430    442   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  431    443   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  432    444   
    }
  433    445   
  434    446   
    /// Serializes enums in the query string
  435    447   
    /// Test ID: Ec2Enums
  436    448   
    #[::tokio::test]
  437    449   
    #[::tracing_test::traced_test]
  438    450   
    async fn ec2_enums_request() {
  439    451   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  440    452   
        let config_builder = crate::config::Config::builder()
  441    453   
            .with_test_defaults()
  442         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         454  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         455  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         456  +
            .allow_no_auth()
  443    457   
            .endpoint_url("https://example.com");
  444    458   
  445    459   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  446    460   
        let result = client
  447    461   
            .simple_input_params()
  448    462   
            .set_foo_enum(::std::option::Option::Some(
  449    463   
                "Foo".parse::<crate::types::FooEnum>().expect("static value validated to member"),
  450    464   
            ))
  451    465   
            .send()
  452    466   
            .await;
  453    467   
        let _ = dbg!(result);
  454    468   
        let http_request = request_receiver.expect_request();
  455    469   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  456    470   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  457    471   
        let required_headers = &["Content-Length"];
  458    472   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  459    473   
        let body = http_request.body().bytes().expect("body should be strict");
  460    474   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  461    475   
            body,
  462    476   
            "Action=SimpleInputParams&Version=2020-01-08&FooEnum=Foo",
  463    477   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  464    478   
        ));
  465    479   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  466    480   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  467    481   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  468    482   
    }
  469    483   
  470    484   
    /// Serializes query using ec2QueryName trait.
  471    485   
    /// Test ID: Ec2Query
  472    486   
    #[::tokio::test]
  473    487   
    #[::tracing_test::traced_test]
  474    488   
    async fn ec2_query_request() {
  475    489   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  476    490   
        let config_builder = crate::config::Config::builder()
  477    491   
            .with_test_defaults()
  478         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         492  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         493  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         494  +
            .allow_no_auth()
  479    495   
            .endpoint_url("https://example.com");
  480    496   
  481    497   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  482    498   
        let result = client
  483    499   
            .simple_input_params()
  484    500   
            .set_has_query_name(::std::option::Option::Some("Hi".to_owned()))
  485    501   
            .send()
  486    502   
            .await;
  487    503   
        let _ = dbg!(result);
  488    504   
        let http_request = request_receiver.expect_request();
  489    505   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  490    506   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  491    507   
        let required_headers = &["Content-Length"];
  492    508   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  493    509   
        let body = http_request.body().bytes().expect("body should be strict");
  494    510   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  495    511   
            body,
  496    512   
            "Action=SimpleInputParams&Version=2020-01-08&HasQueryName=Hi",
  497    513   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  498    514   
        ));
  499    515   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  500    516   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  501    517   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  502    518   
    }
  503    519   
  504    520   
    /// ec2QueryName trait is preferred over xmlName.
  505    521   
    /// Test ID: Ec2QueryIsPreferred
  506    522   
    #[::tokio::test]
  507    523   
    #[::tracing_test::traced_test]
  508    524   
    async fn ec2_query_is_preferred_request() {
  509    525   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  510    526   
        let config_builder = crate::config::Config::builder()
  511    527   
            .with_test_defaults()
  512         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         528  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         529  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         530  +
            .allow_no_auth()
  513    531   
            .endpoint_url("https://example.com");
  514    532   
  515    533   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  516    534   
        let result = client
  517    535   
            .simple_input_params()
  518    536   
            .set_has_query_and_xml_name(::std::option::Option::Some("Hi".to_owned()))
  519    537   
            .send()
  520    538   
            .await;
  521    539   
        let _ = dbg!(result);
  522    540   
        let http_request = request_receiver.expect_request();
  523    541   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  524    542   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  525    543   
        let required_headers = &["Content-Length"];
  526    544   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  527    545   
        let body = http_request.body().bytes().expect("body should be strict");
  528    546   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  529    547   
            body,
  530    548   
            "Action=SimpleInputParams&Version=2020-01-08&HasQueryAndXmlName=Hi",
  531    549   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  532    550   
        ));
  533    551   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  534    552   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  535    553   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  536    554   
    }
  537    555   
  538    556   
    /// xmlName is used with the ec2 protocol, but the first character is uppercased
  539    557   
    /// Test ID: Ec2XmlNameIsUppercased
  540    558   
    #[::tokio::test]
  541    559   
    #[::tracing_test::traced_test]
  542    560   
    async fn ec2_xml_name_is_uppercased_request() {
  543    561   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  544    562   
        let config_builder = crate::config::Config::builder()
  545    563   
            .with_test_defaults()
  546         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         564  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         565  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         566  +
            .allow_no_auth()
  547    567   
            .endpoint_url("https://example.com");
  548    568   
  549    569   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  550    570   
        let result = client
  551    571   
            .simple_input_params()
  552    572   
            .set_uses_xml_name(::std::option::Option::Some("Hi".to_owned()))
  553    573   
            .send()
  554    574   
            .await;
  555    575   
        let _ = dbg!(result);
  556    576   
        let http_request = request_receiver.expect_request();
  557    577   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  558    578   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  559    579   
        let required_headers = &["Content-Length"];
  560    580   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  561    581   
        let body = http_request.body().bytes().expect("body should be strict");
  562    582   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  563    583   
            body,
  564    584   
            "Action=SimpleInputParams&Version=2020-01-08&UsesXmlName=Hi",
  565    585   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  566    586   
        ));
  567    587   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  568    588   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  569    589   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  570    590   
    }
  571    591   
  572    592   
    /// Supports handling NaN float values.
  573    593   
    /// Test ID: Ec2QuerySupportsNaNFloatInputs
  574    594   
    #[::tokio::test]
  575    595   
    #[::tracing_test::traced_test]
  576    596   
    async fn ec2_query_supports_na_n_float_inputs_request() {
  577    597   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  578    598   
        let config_builder = crate::config::Config::builder()
  579    599   
            .with_test_defaults()
  580         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         600  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         601  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         602  +
            .allow_no_auth()
  581    603   
            .endpoint_url("https://example.com");
  582    604   
  583    605   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  584    606   
        let result = client
  585    607   
            .simple_input_params()
  586    608   
            .set_float_value(::std::option::Option::Some(
  587    609   
                <f32 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("NaN").expect("invalid string for number"),
  588    610   
            ))
  589    611   
            .set_boo(::std::option::Option::Some(
  590    612   
                <f64 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("NaN").expect("invalid string for number"),
  591    613   
            ))
  592    614   
            .send()
  593    615   
            .await;
  594    616   
        let _ = dbg!(result);
  595    617   
        let http_request = request_receiver.expect_request();
  596    618   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  597    619   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  598    620   
        let required_headers = &["Content-Length"];
  599    621   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  600    622   
        let body = http_request.body().bytes().expect("body should be strict");
  601    623   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  602    624   
            body,
  603    625   
            "Action=SimpleInputParams&Version=2020-01-08&FloatValue=NaN&Boo=NaN",
  604    626   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  605    627   
        ));
  606    628   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  607    629   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  608    630   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  609    631   
    }
  610    632   
  611    633   
    /// Supports handling Infinity float values.
  612    634   
    /// Test ID: Ec2QuerySupportsInfinityFloatInputs
  613    635   
    #[::tokio::test]
  614    636   
    #[::tracing_test::traced_test]
  615    637   
    async fn ec2_query_supports_infinity_float_inputs_request() {
  616    638   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  617    639   
        let config_builder = crate::config::Config::builder()
  618    640   
            .with_test_defaults()
  619         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         641  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         642  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         643  +
            .allow_no_auth()
  620    644   
            .endpoint_url("https://example.com");
  621    645   
  622    646   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  623    647   
        let result = client
  624    648   
            .simple_input_params()
  625    649   
            .set_float_value(::std::option::Option::Some(
  626    650   
                <f32 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("Infinity").expect("invalid string for number"),
  627    651   
            ))
  628    652   
            .set_boo(::std::option::Option::Some(
  629    653   
                <f64 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("Infinity").expect("invalid string for number"),
  630    654   
            ))
  631    655   
            .send()
  632    656   
            .await;
  633    657   
        let _ = dbg!(result);
  634    658   
        let http_request = request_receiver.expect_request();
  635    659   
        let expected_headers = [("Content-Type", "application/x-www-form-urlencoded")];
  636    660   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_headers(http_request.headers(), expected_headers));
  637    661   
        let required_headers = &["Content-Length"];
  638    662   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::require_headers(http_request.headers(), required_headers));
  639    663   
        let body = http_request.body().bytes().expect("body should be strict");
  640    664   
        ::aws_smithy_protocol_test::assert_ok(::aws_smithy_protocol_test::validate_body(
  641    665   
            body,
  642    666   
            "Action=SimpleInputParams&Version=2020-01-08&FloatValue=Infinity&Boo=Infinity",
  643    667   
            ::aws_smithy_protocol_test::MediaType::from("application/x-www-form-urlencoded"),
  644    668   
        ));
  645    669   
        let uri: ::http::Uri = http_request.uri().parse().expect("invalid URI sent");
  646    670   
        ::pretty_assertions::assert_eq!(http_request.method(), "POST", "method was incorrect");
  647    671   
        ::pretty_assertions::assert_eq!(uri.path(), "/", "path was incorrect");
  648    672   
    }
  649    673   
  650    674   
    /// Supports handling -Infinity float values.
  651    675   
    /// Test ID: Ec2QuerySupportsNegativeInfinityFloatInputs
  652    676   
    #[::tokio::test]
  653    677   
    #[::tracing_test::traced_test]
  654    678   
    async fn ec2_query_supports_negative_infinity_float_inputs_request() {
  655    679   
        let (http_client, request_receiver) = ::aws_smithy_http_client::test_util::capture_request(None);
  656    680   
        let config_builder = crate::config::Config::builder()
  657    681   
            .with_test_defaults()
  658         -
            .auth_scheme_resolver(crate::config::auth::NoAuthSchemeResolver)
         682  +
            // TODO(https://github.com/smithy-lang/smithy-rs/issues/4177):
         683  +
            //  Until the incorrect separation is addressed, we need to rely on this workaround.
         684  +
            .allow_no_auth()
  659    685   
            .endpoint_url("https://example.com");
  660    686   
  661    687   
        let client = crate::Client::from_conf(config_builder.http_client(http_client).build());
  662    688   
        let result = client
  663    689   
            .simple_input_params()
  664    690   
            .set_float_value(::std::option::Option::Some(
  665    691   
                <f32 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("-Infinity").expect("invalid string for number"),
  666    692   
            ))
  667    693   
            .set_boo(::std::option::Option::Some(
  668    694   
                <f64 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive("-Infinity").expect("invalid string for number"),