3 3 | pub fn de_enable_mfa_device_http_error(
|
4 4 | _response_status: u16,
|
5 5 | _response_headers: &::aws_smithy_runtime_api::http::Headers,
|
6 6 | _response_body: &[u8],
|
7 7 | ) -> std::result::Result<crate::operation::enable_mfa_device::EnableMfaDeviceOutput, crate::operation::enable_mfa_device::EnableMFADeviceError> {
|
8 8 | #[allow(unused_mut)]
|
9 9 | let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
|
10 10 | .map_err(crate::operation::enable_mfa_device::EnableMFADeviceError::unhandled)?;
|
11 11 | generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
|
12 12 | let generic = generic_builder.build();
|
13 13 | let error_code = match generic.code() {
|
14 14 | Some(code) => code,
|
15 15 | None => return Err(crate::operation::enable_mfa_device::EnableMFADeviceError::unhandled(generic)),
|
16 16 | };
|
17 17 |
|
18 18 | let _error_message = generic.message().map(|msg| msg.to_owned());
|
19 19 | Err(match error_code {
|
20 20 | "ConcurrentModification" => crate::operation::enable_mfa_device::EnableMFADeviceError::ConcurrentModificationException({
|
21 21 | #[allow(unused_mut)]
|
22 22 | let mut tmp = {
|
23 23 | #[allow(unused_mut)]
|
24 24 | let mut output = crate::types::error::builders::ConcurrentModificationExceptionBuilder::default();
|
25 25 | output = crate::protocol_serde::shape_concurrent_modification_exception::de_concurrent_modification_exception_xml_err(
|
26 26 | _response_body,
|
27 27 | output,
|
28 28 | )
|
29 29 | .map_err(crate::operation::enable_mfa_device::EnableMFADeviceError::unhandled)?;
|
30 30 | let output = output.meta(generic);
|
31 31 | output.build()
|
32 32 | };
|
33 - | if tmp.message.is_none() {
|
34 - | tmp.message = _error_message;
|
35 - | }
|
36 33 | tmp
|
37 34 | }),
|
38 35 | "EntityAlreadyExists" => crate::operation::enable_mfa_device::EnableMFADeviceError::EntityAlreadyExistsException({
|
39 36 | #[allow(unused_mut)]
|
40 37 | let mut tmp = {
|
41 38 | #[allow(unused_mut)]
|
42 39 | let mut output = crate::types::error::builders::EntityAlreadyExistsExceptionBuilder::default();
|
43 40 | output =
|
44 41 | crate::protocol_serde::shape_entity_already_exists_exception::de_entity_already_exists_exception_xml_err(_response_body, output)
|
45 42 | .map_err(crate::operation::enable_mfa_device::EnableMFADeviceError::unhandled)?;
|
46 43 | let output = output.meta(generic);
|
47 44 | output.build()
|
48 45 | };
|
49 - | if tmp.message.is_none() {
|
50 - | tmp.message = _error_message;
|
51 - | }
|
52 46 | tmp
|
53 47 | }),
|
54 48 | "EntityTemporarilyUnmodifiable" => crate::operation::enable_mfa_device::EnableMFADeviceError::EntityTemporarilyUnmodifiableException({
|
55 49 | #[allow(unused_mut)]
|
56 50 | let mut tmp = {
|
57 51 | #[allow(unused_mut)]
|
58 52 | let mut output = crate::types::error::builders::EntityTemporarilyUnmodifiableExceptionBuilder::default();
|
59 53 | output =
|
60 54 | crate::protocol_serde::shape_entity_temporarily_unmodifiable_exception::de_entity_temporarily_unmodifiable_exception_xml_err(
|
61 55 | _response_body,
|
62 56 | output,
|
63 57 | )
|
64 58 | .map_err(crate::operation::enable_mfa_device::EnableMFADeviceError::unhandled)?;
|
65 59 | let output = output.meta(generic);
|
66 60 | output.build()
|
67 61 | };
|
68 - | if tmp.message.is_none() {
|
69 - | tmp.message = _error_message;
|
70 - | }
|
71 62 | tmp
|
72 63 | }),
|
73 64 | "InvalidAuthenticationCode" => crate::operation::enable_mfa_device::EnableMFADeviceError::InvalidAuthenticationCodeException({
|
74 65 | #[allow(unused_mut)]
|
75 66 | let mut tmp = {
|
76 67 | #[allow(unused_mut)]
|
77 68 | let mut output = crate::types::error::builders::InvalidAuthenticationCodeExceptionBuilder::default();
|
78 69 | output = crate::protocol_serde::shape_invalid_authentication_code_exception::de_invalid_authentication_code_exception_xml_err(
|
79 70 | _response_body,
|
80 71 | output,
|
81 72 | )
|
82 73 | .map_err(crate::operation::enable_mfa_device::EnableMFADeviceError::unhandled)?;
|
83 74 | let output = output.meta(generic);
|
84 75 | output.build()
|
85 76 | };
|
86 - | if tmp.message.is_none() {
|
87 - | tmp.message = _error_message;
|
88 - | }
|
89 77 | tmp
|
90 78 | }),
|
91 79 | "LimitExceeded" => crate::operation::enable_mfa_device::EnableMFADeviceError::LimitExceededException({
|
92 80 | #[allow(unused_mut)]
|
93 81 | let mut tmp = {
|
94 82 | #[allow(unused_mut)]
|
95 83 | let mut output = crate::types::error::builders::LimitExceededExceptionBuilder::default();
|
96 84 | output = crate::protocol_serde::shape_limit_exceeded_exception::de_limit_exceeded_exception_xml_err(_response_body, output)
|
97 85 | .map_err(crate::operation::enable_mfa_device::EnableMFADeviceError::unhandled)?;
|
98 86 | let output = output.meta(generic);
|
99 87 | output.build()
|
100 88 | };
|
101 - | if tmp.message.is_none() {
|
102 - | tmp.message = _error_message;
|
103 - | }
|
104 89 | tmp
|
105 90 | }),
|
106 91 | "NoSuchEntity" => crate::operation::enable_mfa_device::EnableMFADeviceError::NoSuchEntityException({
|
107 92 | #[allow(unused_mut)]
|
108 93 | let mut tmp = {
|
109 94 | #[allow(unused_mut)]
|
110 95 | let mut output = crate::types::error::builders::NoSuchEntityExceptionBuilder::default();
|
111 96 | output = crate::protocol_serde::shape_no_such_entity_exception::de_no_such_entity_exception_xml_err(_response_body, output)
|
112 97 | .map_err(crate::operation::enable_mfa_device::EnableMFADeviceError::unhandled)?;
|
113 98 | let output = output.meta(generic);
|
114 99 | output.build()
|
115 100 | };
|
116 - | if tmp.message.is_none() {
|
117 - | tmp.message = _error_message;
|
118 - | }
|
119 101 | tmp
|
120 102 | }),
|
121 103 | "ServiceFailure" => crate::operation::enable_mfa_device::EnableMFADeviceError::ServiceFailureException({
|
122 104 | #[allow(unused_mut)]
|
123 105 | let mut tmp = {
|
124 106 | #[allow(unused_mut)]
|
125 107 | let mut output = crate::types::error::builders::ServiceFailureExceptionBuilder::default();
|
126 108 | output = crate::protocol_serde::shape_service_failure_exception::de_service_failure_exception_xml_err(_response_body, output)
|
127 109 | .map_err(crate::operation::enable_mfa_device::EnableMFADeviceError::unhandled)?;
|
128 110 | let output = output.meta(generic);
|
129 111 | output.build()
|
130 112 | };
|
131 - | if tmp.message.is_none() {
|
132 - | tmp.message = _error_message;
|
133 - | }
|
134 113 | tmp
|
135 114 | }),
|
136 115 | _ => crate::operation::enable_mfa_device::EnableMFADeviceError::generic(generic),
|
137 116 | })
|
138 117 | }
|
139 118 |
|
140 119 | #[allow(clippy::unnecessary_wraps)]
|
141 120 | pub fn de_enable_mfa_device_http_response(
|
142 121 | _response_status: u16,
|
143 122 | _response_headers: &::aws_smithy_runtime_api::http::Headers,
|