aws_sdk_sts/operation/
assume_role_with_saml.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2/// Orchestration and serialization glue logic for `AssumeRoleWithSAML`.
3#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
4#[non_exhaustive]
5pub struct AssumeRoleWithSAML;
6impl AssumeRoleWithSAML {
7    /// Creates a new `AssumeRoleWithSAML`
8    pub fn new() -> Self {
9        Self
10    }
11    pub(crate) async fn orchestrate(
12                        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
13                        input: crate::operation::assume_role_with_saml::AssumeRoleWithSamlInput,
14                    ) -> ::std::result::Result<crate::operation::assume_role_with_saml::AssumeRoleWithSamlOutput, ::aws_smithy_runtime_api::client::result::SdkError<crate::operation::assume_role_with_saml::AssumeRoleWithSAMLError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>> {
15                        let map_err = |err: ::aws_smithy_runtime_api::client::result::SdkError<::aws_smithy_runtime_api::client::interceptors::context::Error, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>| {
16                            err.map_service_error(|err| {
17                                err.downcast::<crate::operation::assume_role_with_saml::AssumeRoleWithSAMLError>().expect("correct error type")
18                            })
19                        };
20                        let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
21                            .await
22                            .map_err(map_err)?;
23                        let output = context.finalize().map_err(map_err)?;
24                        ::std::result::Result::Ok(output.downcast::<crate::operation::assume_role_with_saml::AssumeRoleWithSamlOutput>().expect("correct output type"))
25                    }
26    
27                    pub(crate) async fn orchestrate_with_stop_point(
28                        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
29                        input: crate::operation::assume_role_with_saml::AssumeRoleWithSamlInput,
30                        stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
31                    ) -> ::std::result::Result<::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext, ::aws_smithy_runtime_api::client::result::SdkError<::aws_smithy_runtime_api::client::interceptors::context::Error, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>> {
32                        let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
33                        use ::tracing::Instrument;
34                        ::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point(
35                            "STS",
36                            "AssumeRoleWithSAML",
37                            input,
38                            runtime_plugins,
39                            stop_point
40                        )
41                        // Create a parent span for the entire operation. Includes a random, internal-only,
42                        // seven-digit ID for the operation orchestration so that it can be correlated in the logs.
43                        .instrument(::tracing::debug_span!(
44                                "STS.AssumeRoleWithSAML",
45                                "rpc.service" = "STS",
46                                "rpc.method" = "AssumeRoleWithSAML",
47                                "sdk_invocation_id" = ::fastrand::u32(1_000_000..10_000_000),
48                                "rpc.system" = "aws-api",
49                            ))
50                        .await
51                    }
52    
53                    pub(crate) fn operation_runtime_plugins(
54                        client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
55                        client_config: &crate::config::Config,
56                        config_override: ::std::option::Option<crate::config::Builder>,
57                    ) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
58                        let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
59                        
60                        if let ::std::option::Option::Some(config_override) = config_override {
61                            for plugin in config_override.runtime_plugins.iter().cloned() {
62                                runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
63                            }
64                            runtime_plugins = runtime_plugins.with_operation_plugin(
65                                crate::config::ConfigOverrideRuntimePlugin::new(config_override, client_config.config.clone(), &client_config.runtime_components)
66                            );
67                        }
68                        runtime_plugins
69                    }
70}
71impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for AssumeRoleWithSAML {
72                fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
73                    let mut cfg = ::aws_smithy_types::config_bag::Layer::new("AssumeRoleWithSAML");
74
75                    cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(AssumeRoleWithSAMLRequestSerializer));
76                    cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(AssumeRoleWithSAMLResponseDeserializer));
77
78                    cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(
79                        crate::config::auth::Params::builder()
80                            .operation_name("AssumeRoleWithSAML")
81                            .build()
82                            .expect("required fields set")
83                    ));
84
85                    cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::SensitiveOutput);
86cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new(
87                            "AssumeRoleWithSAML",
88                            "STS",
89                        ));
90
91                    ::std::option::Option::Some(cfg.freeze())
92                }
93
94                fn runtime_components(&self, _: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
95                    #[allow(unused_mut)]
96                    let mut rcb = ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("AssumeRoleWithSAML")
97                            .with_interceptor(::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default())
98.with_interceptor(AssumeRoleWithSAMLEndpointParamsInterceptor)
99                            .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<crate::operation::assume_role_with_saml::AssumeRoleWithSAMLError>::new())
100.with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<crate::operation::assume_role_with_saml::AssumeRoleWithSAMLError>::new())
101.with_retry_classifier(::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<crate::operation::assume_role_with_saml::AssumeRoleWithSAMLError>::new());
102
103                    ::std::borrow::Cow::Owned(rcb)
104                }
105            }
106
107            
108#[derive(Debug)]
109            struct AssumeRoleWithSAMLResponseDeserializer;
110            impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for AssumeRoleWithSAMLResponseDeserializer {
111                
112
113                fn deserialize_nonstreaming(&self, response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
114                    let (success, status) = (response.status().is_success(), response.status().as_u16());
115            let headers = response.headers();
116            let body = response.body().bytes().expect("body loaded");
117            #[allow(unused_mut)]
118            let mut force_error = false;
119            ::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
120            let parse_result = if !success && status != 200 || force_error {
121                crate::protocol_serde::shape_assume_role_with_saml::de_assume_role_with_saml_http_error(status, headers, body)
122            } else {
123                crate::protocol_serde::shape_assume_role_with_saml::de_assume_role_with_saml_http_response(status, headers, body)
124            };
125            crate::protocol_serde::type_erase_result(parse_result)
126                }
127            }
128#[derive(Debug)]
129            struct AssumeRoleWithSAMLRequestSerializer;
130            impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for AssumeRoleWithSAMLRequestSerializer {
131                #[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
132                fn serialize_input(&self, input: ::aws_smithy_runtime_api::client::interceptors::context::Input, _cfg: &mut ::aws_smithy_types::config_bag::ConfigBag) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
133                    let input = input.downcast::<crate::operation::assume_role_with_saml::AssumeRoleWithSamlInput>().expect("correct type");
134                    let _header_serialization_settings = _cfg.load::<crate::serialization_settings::HeaderSerializationSettings>().cloned().unwrap_or_default();
135                    let mut request_builder = {
136                        fn uri_base(_input: &crate::operation::assume_role_with_saml::AssumeRoleWithSamlInput, output: &mut ::std::string::String) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
137    use ::std::fmt::Write as _;
138    ::std::write!(output, "/").expect("formatting should succeed");
139    ::std::result::Result::Ok(())
140}
141#[allow(clippy::unnecessary_wraps)]
142fn update_http_builder(
143                input: &crate::operation::assume_role_with_saml::AssumeRoleWithSamlInput,
144                builder: ::http::request::Builder
145            ) -> ::std::result::Result<::http::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
146    let mut uri = ::std::string::String::new();
147    uri_base(input, &mut uri)?;
148    ::std::result::Result::Ok(builder.method("POST").uri(uri))
149}
150let mut builder = update_http_builder(&input, ::http::request::Builder::new())?;
151builder = _header_serialization_settings.set_default_header(builder, ::http::header::CONTENT_TYPE, "application/x-www-form-urlencoded");
152builder
153                    };
154                    let body = ::aws_smithy_types::body::SdkBody::from(crate::protocol_serde::shape_assume_role_with_saml_input::ser_assume_role_with_saml_input_input_input(&input)?);
155                    if let Some(content_length) = body.content_length() {
156                                let content_length = content_length.to_string();
157                                request_builder = _header_serialization_settings.set_default_header(request_builder, ::http::header::CONTENT_LENGTH, &content_length);
158                            }
159                    ::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
160                }
161            }
162#[derive(Debug)]
163            struct AssumeRoleWithSAMLEndpointParamsInterceptor;
164
165            impl ::aws_smithy_runtime_api::client::interceptors::Intercept for AssumeRoleWithSAMLEndpointParamsInterceptor {
166                fn name(&self) -> &'static str {
167                    "AssumeRoleWithSAMLEndpointParamsInterceptor"
168                }
169
170                fn read_before_execution(
171                    &self,
172                    context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<'_, ::aws_smithy_runtime_api::client::interceptors::context::Input, ::aws_smithy_runtime_api::client::interceptors::context::Output, ::aws_smithy_runtime_api::client::interceptors::context::Error>,
173                    cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
174                ) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
175                    let _input = context.input()
176                        .downcast_ref::<AssumeRoleWithSamlInput>()
177                        .ok_or("failed to downcast to AssumeRoleWithSamlInput")?;
178
179                    
180
181                    let params = crate::config::endpoint::Params::builder()
182                        .set_region(cfg.load::<::aws_types::region::Region>().map(|r|r.as_ref().to_owned()))
183.set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
184.set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
185.set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
186                        .build()
187                        .map_err(|err| ::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err))?;
188                    cfg.interceptor_state().store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
189                    ::std::result::Result::Ok(())
190                }
191            }
192
193            // The get_* functions below are generated from JMESPath expressions in the
194            // operationContextParams trait. They target the operation's input shape.
195
196            
197
198/// Error type for the `AssumeRoleWithSAMLError` operation.
199#[non_exhaustive]
200#[derive(::std::fmt::Debug)]
201pub enum AssumeRoleWithSAMLError {
202    /// <p>The web identity token that was passed is expired or is not valid. Get a new identity token from the identity provider and then retry the request.</p>
203    ExpiredTokenException(crate::types::error::ExpiredTokenException),
204    /// <p>The identity provider (IdP) reported that authentication failed. This might be because the claim is invalid.</p>
205    /// <p>If this error is returned for the <code>AssumeRoleWithWebIdentity</code> operation, it can also mean that the claim has expired or has been explicitly revoked.</p>
206    IdpRejectedClaimException(crate::types::error::IdpRejectedClaimException),
207    /// <p>The web identity token that was passed could not be validated by Amazon Web Services. Get a new identity token from the identity provider and then retry the request.</p>
208    InvalidIdentityTokenException(crate::types::error::InvalidIdentityTokenException),
209    /// <p>The request was rejected because the policy document was malformed. The error message describes the specific error.</p>
210    MalformedPolicyDocumentException(crate::types::error::MalformedPolicyDocumentException),
211    /// <p>The request was rejected because the total packed size of the session policies and session tags combined was too large. An Amazon Web Services conversion compresses the session policy document, session policy ARNs, and session tags into a packed binary format that has a separate limit. The error message indicates by percentage how close the policies and tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the <i>IAM User Guide</i>.</p>
212    /// <p>You could receive this error even though you meet other defined session policy and session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User Guide</i>.</p>
213    PackedPolicyTooLargeException(crate::types::error::PackedPolicyTooLargeException),
214    /// <p>STS is not activated in the requested region for the account that is being asked to generate credentials. The account administrator must use the IAM console to activate STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User Guide</i>.</p>
215    RegionDisabledException(crate::types::error::RegionDisabledException),
216    /// An unexpected error occurred (e.g., invalid JSON returned by the service or an unknown error code).
217                    #[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
218    variable wildcard pattern and check `.code()`:
219     \
220    &nbsp;&nbsp;&nbsp;`err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
221     \
222    See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-AssumeRoleWithSAMLError) for what information is available for the error.")]
223                    Unhandled(crate::error::sealed_unhandled::Unhandled),
224}
225impl AssumeRoleWithSAMLError {
226    /// Creates the `AssumeRoleWithSAMLError::Unhandled` variant from any error type.
227                    pub fn unhandled(err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>) -> Self {
228                        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source: err.into(), meta: ::std::default::Default::default() })
229                    }
230    
231                    /// Creates the `AssumeRoleWithSAMLError::Unhandled` variant from an [`ErrorMetadata`](::aws_smithy_types::error::ErrorMetadata).
232                    pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
233                        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source: err.clone().into(), meta: err })
234                    }
235    /// 
236    /// Returns error metadata, which includes the error code, message,
237    /// request ID, and potentially additional information.
238    /// 
239    pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
240        match self {
241            Self::ExpiredTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
242            Self::IdpRejectedClaimException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
243            Self::InvalidIdentityTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
244            Self::MalformedPolicyDocumentException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
245            Self::PackedPolicyTooLargeException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
246            Self::RegionDisabledException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
247            Self::Unhandled(e) => &e.meta,
248        }
249    }
250    /// Returns `true` if the error kind is `AssumeRoleWithSAMLError::ExpiredTokenException`.
251    pub fn is_expired_token_exception(&self) -> bool {
252        matches!(self, Self::ExpiredTokenException(_))
253    }
254    /// Returns `true` if the error kind is `AssumeRoleWithSAMLError::IdpRejectedClaimException`.
255    pub fn is_idp_rejected_claim_exception(&self) -> bool {
256        matches!(self, Self::IdpRejectedClaimException(_))
257    }
258    /// Returns `true` if the error kind is `AssumeRoleWithSAMLError::InvalidIdentityTokenException`.
259    pub fn is_invalid_identity_token_exception(&self) -> bool {
260        matches!(self, Self::InvalidIdentityTokenException(_))
261    }
262    /// Returns `true` if the error kind is `AssumeRoleWithSAMLError::MalformedPolicyDocumentException`.
263    pub fn is_malformed_policy_document_exception(&self) -> bool {
264        matches!(self, Self::MalformedPolicyDocumentException(_))
265    }
266    /// Returns `true` if the error kind is `AssumeRoleWithSAMLError::PackedPolicyTooLargeException`.
267    pub fn is_packed_policy_too_large_exception(&self) -> bool {
268        matches!(self, Self::PackedPolicyTooLargeException(_))
269    }
270    /// Returns `true` if the error kind is `AssumeRoleWithSAMLError::RegionDisabledException`.
271    pub fn is_region_disabled_exception(&self) -> bool {
272        matches!(self, Self::RegionDisabledException(_))
273    }
274}
275impl ::std::error::Error for AssumeRoleWithSAMLError {
276    fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
277        match self {
278            Self::ExpiredTokenException(_inner) =>
279            ::std::option::Option::Some(_inner)
280            ,
281            Self::IdpRejectedClaimException(_inner) =>
282            ::std::option::Option::Some(_inner)
283            ,
284            Self::InvalidIdentityTokenException(_inner) =>
285            ::std::option::Option::Some(_inner)
286            ,
287            Self::MalformedPolicyDocumentException(_inner) =>
288            ::std::option::Option::Some(_inner)
289            ,
290            Self::PackedPolicyTooLargeException(_inner) =>
291            ::std::option::Option::Some(_inner)
292            ,
293            Self::RegionDisabledException(_inner) =>
294            ::std::option::Option::Some(_inner)
295            ,
296            Self::Unhandled(_inner) => {
297                ::std::option::Option::Some(&*_inner.source)
298            }
299        }
300    }
301}
302impl ::std::fmt::Display for AssumeRoleWithSAMLError {
303    fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
304        match self {
305            Self::ExpiredTokenException(_inner) =>
306            _inner.fmt(f)
307            ,
308            Self::IdpRejectedClaimException(_inner) =>
309            _inner.fmt(f)
310            ,
311            Self::InvalidIdentityTokenException(_inner) =>
312            _inner.fmt(f)
313            ,
314            Self::MalformedPolicyDocumentException(_inner) =>
315            _inner.fmt(f)
316            ,
317            Self::PackedPolicyTooLargeException(_inner) =>
318            _inner.fmt(f)
319            ,
320            Self::RegionDisabledException(_inner) =>
321            _inner.fmt(f)
322            ,
323            Self::Unhandled(_inner) => {
324                if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
325                                                        write!(f, "unhandled error ({code})")
326                                                    } else {
327                                                        f.write_str("unhandled error")
328                                                    }
329            }
330        }
331    }
332}
333impl ::aws_smithy_types::retry::ProvideErrorKind for AssumeRoleWithSAMLError {
334    fn code(&self) -> ::std::option::Option<&str> {
335        ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
336    }
337    fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
338        ::std::option::Option::None
339    }
340}
341impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for AssumeRoleWithSAMLError {
342    fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
343        match self {
344            Self::ExpiredTokenException(_inner) =>
345            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
346            ,
347            Self::IdpRejectedClaimException(_inner) =>
348            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
349            ,
350            Self::InvalidIdentityTokenException(_inner) =>
351            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
352            ,
353            Self::MalformedPolicyDocumentException(_inner) =>
354            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
355            ,
356            Self::PackedPolicyTooLargeException(_inner) =>
357            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
358            ,
359            Self::RegionDisabledException(_inner) =>
360            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
361            ,
362            Self::Unhandled(_inner) => {
363                &_inner.meta
364            }
365        }
366    }
367}
368impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for AssumeRoleWithSAMLError {
369    fn create_unhandled_error(
370                        source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
371                        meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>
372                    ) -> Self {
373        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source, meta: meta.unwrap_or_default() })
374    }
375}
376impl ::aws_types::request_id::RequestId for crate::operation::assume_role_with_saml::AssumeRoleWithSAMLError {
377                                fn request_id(&self) -> Option<&str> {
378                                    self.meta().request_id()
379                                }
380                            }
381
382pub use crate::operation::assume_role_with_saml::_assume_role_with_saml_output::AssumeRoleWithSamlOutput;
383
384pub use crate::operation::assume_role_with_saml::_assume_role_with_saml_input::AssumeRoleWithSamlInput;
385
386mod _assume_role_with_saml_input;
387
388mod _assume_role_with_saml_output;
389
390/// Builders
391pub mod builders;
392