23 23 | "CloudHsmClusterInvalidConfigurationException" => {
|
24 24 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::CloudHsmClusterInvalidConfigurationException({
|
25 25 | #[allow(unused_mut)]
|
26 26 | let mut tmp = {
|
27 27 | #[allow(unused_mut)]
|
28 28 | let mut output = crate::types::error::builders::CloudHsmClusterInvalidConfigurationExceptionBuilder::default();
|
29 29 | output = crate::protocol_serde::shape_cloud_hsm_cluster_invalid_configuration_exception::de_cloud_hsm_cluster_invalid_configuration_exception_json_err(_response_body, output).map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
30 30 | let output = output.meta(generic);
|
31 31 | output.build()
|
32 32 | };
|
33 - | if tmp.message.is_none() {
|
34 - | tmp.message = _error_message;
|
35 - | }
|
36 33 | tmp
|
37 34 | })
|
38 35 | }
|
39 36 | "CloudHsmClusterNotActiveException" => {
|
40 37 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::CloudHsmClusterNotActiveException({
|
41 38 | #[allow(unused_mut)]
|
42 39 | let mut tmp = {
|
43 40 | #[allow(unused_mut)]
|
44 41 | let mut output = crate::types::error::builders::CloudHsmClusterNotActiveExceptionBuilder::default();
|
45 42 | output = crate::protocol_serde::shape_cloud_hsm_cluster_not_active_exception::de_cloud_hsm_cluster_not_active_exception_json_err(
|
46 43 | _response_body,
|
47 44 | output,
|
48 45 | )
|
49 46 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
50 47 | let output = output.meta(generic);
|
51 48 | output.build()
|
52 49 | };
|
53 - | if tmp.message.is_none() {
|
54 - | tmp.message = _error_message;
|
55 - | }
|
56 50 | tmp
|
57 51 | })
|
58 52 | }
|
59 53 | "CloudHsmClusterNotFoundException" => {
|
60 54 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::CloudHsmClusterNotFoundException({
|
61 55 | #[allow(unused_mut)]
|
62 56 | let mut tmp = {
|
63 57 | #[allow(unused_mut)]
|
64 58 | let mut output = crate::types::error::builders::CloudHsmClusterNotFoundExceptionBuilder::default();
|
65 59 | output = crate::protocol_serde::shape_cloud_hsm_cluster_not_found_exception::de_cloud_hsm_cluster_not_found_exception_json_err(
|
66 60 | _response_body,
|
67 61 | output,
|
68 62 | )
|
69 63 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
70 64 | let output = output.meta(generic);
|
71 65 | output.build()
|
72 66 | };
|
73 - | if tmp.message.is_none() {
|
74 - | tmp.message = _error_message;
|
75 - | }
|
76 67 | tmp
|
77 68 | })
|
78 69 | }
|
79 70 | "CloudHsmClusterNotRelatedException" => {
|
80 71 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::CloudHsmClusterNotRelatedException({
|
81 72 | #[allow(unused_mut)]
|
82 73 | let mut tmp = {
|
83 74 | #[allow(unused_mut)]
|
84 75 | let mut output = crate::types::error::builders::CloudHsmClusterNotRelatedExceptionBuilder::default();
|
85 76 | output =
|
86 77 | crate::protocol_serde::shape_cloud_hsm_cluster_not_related_exception::de_cloud_hsm_cluster_not_related_exception_json_err(
|
87 78 | _response_body,
|
88 79 | output,
|
89 80 | )
|
90 81 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
91 82 | let output = output.meta(generic);
|
92 83 | output.build()
|
93 84 | };
|
94 - | if tmp.message.is_none() {
|
95 - | tmp.message = _error_message;
|
96 - | }
|
97 85 | tmp
|
98 86 | })
|
99 87 | }
|
100 88 | "CustomKeyStoreInvalidStateException" => {
|
101 89 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::CustomKeyStoreInvalidStateException({
|
102 90 | #[allow(unused_mut)]
|
103 91 | let mut tmp = {
|
104 92 | #[allow(unused_mut)]
|
105 93 | let mut output = crate::types::error::builders::CustomKeyStoreInvalidStateExceptionBuilder::default();
|
106 94 | output =
|
107 95 | crate::protocol_serde::shape_custom_key_store_invalid_state_exception::de_custom_key_store_invalid_state_exception_json_err(
|
108 96 | _response_body,
|
109 97 | output,
|
110 98 | )
|
111 99 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
112 100 | let output = output.meta(generic);
|
113 101 | output.build()
|
114 102 | };
|
115 - | if tmp.message.is_none() {
|
116 - | tmp.message = _error_message;
|
117 - | }
|
118 103 | tmp
|
119 104 | })
|
120 105 | }
|
121 106 | "CustomKeyStoreNameInUseException" => {
|
122 107 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::CustomKeyStoreNameInUseException({
|
123 108 | #[allow(unused_mut)]
|
124 109 | let mut tmp = {
|
125 110 | #[allow(unused_mut)]
|
126 111 | let mut output = crate::types::error::builders::CustomKeyStoreNameInUseExceptionBuilder::default();
|
127 112 | output = crate::protocol_serde::shape_custom_key_store_name_in_use_exception::de_custom_key_store_name_in_use_exception_json_err(
|
128 113 | _response_body,
|
129 114 | output,
|
130 115 | )
|
131 116 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
132 117 | let output = output.meta(generic);
|
133 118 | output.build()
|
134 119 | };
|
135 - | if tmp.message.is_none() {
|
136 - | tmp.message = _error_message;
|
137 - | }
|
138 120 | tmp
|
139 121 | })
|
140 122 | }
|
141 123 | "CustomKeyStoreNotFoundException" => crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::CustomKeyStoreNotFoundException({
|
142 124 | #[allow(unused_mut)]
|
143 125 | let mut tmp = {
|
144 126 | #[allow(unused_mut)]
|
145 127 | let mut output = crate::types::error::builders::CustomKeyStoreNotFoundExceptionBuilder::default();
|
146 128 | output = crate::protocol_serde::shape_custom_key_store_not_found_exception::de_custom_key_store_not_found_exception_json_err(
|
147 129 | _response_body,
|
148 130 | output,
|
149 131 | )
|
150 132 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
151 133 | let output = output.meta(generic);
|
152 134 | output.build()
|
153 135 | };
|
154 - | if tmp.message.is_none() {
|
155 - | tmp.message = _error_message;
|
156 - | }
|
157 136 | tmp
|
158 137 | }),
|
159 138 | "KMSInternalException" => crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::KmsInternalException({
|
160 139 | #[allow(unused_mut)]
|
161 140 | let mut tmp = {
|
162 141 | #[allow(unused_mut)]
|
163 142 | let mut output = crate::types::error::builders::KmsInternalExceptionBuilder::default();
|
164 143 | output = crate::protocol_serde::shape_kms_internal_exception::de_kms_internal_exception_json_err(_response_body, output)
|
165 144 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
166 145 | let output = output.meta(generic);
|
167 146 | output.build()
|
168 147 | };
|
169 - | if tmp.message.is_none() {
|
170 - | tmp.message = _error_message;
|
171 - | }
|
172 148 | tmp
|
173 149 | }),
|
174 150 | "XksProxyIncorrectAuthenticationCredentialException" => {
|
175 151 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::XksProxyIncorrectAuthenticationCredentialException({
|
176 152 | #[allow(unused_mut)]
|
177 153 | let mut tmp = {
|
178 154 | #[allow(unused_mut)]
|
179 155 | let mut output = crate::types::error::builders::XksProxyIncorrectAuthenticationCredentialExceptionBuilder::default();
|
180 156 | output = crate::protocol_serde::shape_xks_proxy_incorrect_authentication_credential_exception::de_xks_proxy_incorrect_authentication_credential_exception_json_err(_response_body, output).map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
181 157 | let output = output.meta(generic);
|
182 158 | output.build()
|
183 159 | };
|
184 - | if tmp.message.is_none() {
|
185 - | tmp.message = _error_message;
|
186 - | }
|
187 160 | tmp
|
188 161 | })
|
189 162 | }
|
190 163 | "XksProxyInvalidConfigurationException" => {
|
191 164 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::XksProxyInvalidConfigurationException({
|
192 165 | #[allow(unused_mut)]
|
193 166 | let mut tmp = {
|
194 167 | #[allow(unused_mut)]
|
195 168 | let mut output = crate::types::error::builders::XksProxyInvalidConfigurationExceptionBuilder::default();
|
196 169 | output = crate::protocol_serde::shape_xks_proxy_invalid_configuration_exception::de_xks_proxy_invalid_configuration_exception_json_err(_response_body, output).map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
197 170 | let output = output.meta(generic);
|
198 171 | output.build()
|
199 172 | };
|
200 - | if tmp.message.is_none() {
|
201 - | tmp.message = _error_message;
|
202 - | }
|
203 173 | tmp
|
204 174 | })
|
205 175 | }
|
206 176 | "XksProxyInvalidResponseException" => {
|
207 177 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::XksProxyInvalidResponseException({
|
208 178 | #[allow(unused_mut)]
|
209 179 | let mut tmp = {
|
210 180 | #[allow(unused_mut)]
|
211 181 | let mut output = crate::types::error::builders::XksProxyInvalidResponseExceptionBuilder::default();
|
212 182 | output = crate::protocol_serde::shape_xks_proxy_invalid_response_exception::de_xks_proxy_invalid_response_exception_json_err(
|
213 183 | _response_body,
|
214 184 | output,
|
215 185 | )
|
216 186 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
217 187 | let output = output.meta(generic);
|
218 188 | output.build()
|
219 189 | };
|
220 - | if tmp.message.is_none() {
|
221 - | tmp.message = _error_message;
|
222 - | }
|
223 190 | tmp
|
224 191 | })
|
225 192 | }
|
226 193 | "XksProxyUriEndpointInUseException" => {
|
227 194 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::XksProxyUriEndpointInUseException({
|
228 195 | #[allow(unused_mut)]
|
229 196 | let mut tmp = {
|
230 197 | #[allow(unused_mut)]
|
231 198 | let mut output = crate::types::error::builders::XksProxyUriEndpointInUseExceptionBuilder::default();
|
232 199 | output =
|
233 200 | crate::protocol_serde::shape_xks_proxy_uri_endpoint_in_use_exception::de_xks_proxy_uri_endpoint_in_use_exception_json_err(
|
234 201 | _response_body,
|
235 202 | output,
|
236 203 | )
|
237 204 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
238 205 | let output = output.meta(generic);
|
239 206 | output.build()
|
240 207 | };
|
241 - | if tmp.message.is_none() {
|
242 - | tmp.message = _error_message;
|
243 - | }
|
244 208 | tmp
|
245 209 | })
|
246 210 | }
|
247 211 | "XksProxyUriInUseException" => crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::XksProxyUriInUseException({
|
248 212 | #[allow(unused_mut)]
|
249 213 | let mut tmp = {
|
250 214 | #[allow(unused_mut)]
|
251 215 | let mut output = crate::types::error::builders::XksProxyUriInUseExceptionBuilder::default();
|
252 216 | output =
|
253 217 | crate::protocol_serde::shape_xks_proxy_uri_in_use_exception::de_xks_proxy_uri_in_use_exception_json_err(_response_body, output)
|
254 218 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
255 219 | let output = output.meta(generic);
|
256 220 | output.build()
|
257 221 | };
|
258 - | if tmp.message.is_none() {
|
259 - | tmp.message = _error_message;
|
260 - | }
|
261 222 | tmp
|
262 223 | }),
|
263 224 | "XksProxyUriUnreachableException" => crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::XksProxyUriUnreachableException({
|
264 225 | #[allow(unused_mut)]
|
265 226 | let mut tmp = {
|
266 227 | #[allow(unused_mut)]
|
267 228 | let mut output = crate::types::error::builders::XksProxyUriUnreachableExceptionBuilder::default();
|
268 229 | output = crate::protocol_serde::shape_xks_proxy_uri_unreachable_exception::de_xks_proxy_uri_unreachable_exception_json_err(
|
269 230 | _response_body,
|
270 231 | output,
|
271 232 | )
|
272 233 | .map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
273 234 | let output = output.meta(generic);
|
274 235 | output.build()
|
275 236 | };
|
276 - | if tmp.message.is_none() {
|
277 - | tmp.message = _error_message;
|
278 - | }
|
279 237 | tmp
|
280 238 | }),
|
281 239 | "XksProxyVpcEndpointServiceInUseException" => {
|
282 240 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::XksProxyVpcEndpointServiceInUseException({
|
283 241 | #[allow(unused_mut)]
|
284 242 | let mut tmp = {
|
285 243 | #[allow(unused_mut)]
|
286 244 | let mut output = crate::types::error::builders::XksProxyVpcEndpointServiceInUseExceptionBuilder::default();
|
287 245 | output = crate::protocol_serde::shape_xks_proxy_vpc_endpoint_service_in_use_exception::de_xks_proxy_vpc_endpoint_service_in_use_exception_json_err(_response_body, output).map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
288 246 | let output = output.meta(generic);
|
289 247 | output.build()
|
290 248 | };
|
291 - | if tmp.message.is_none() {
|
292 - | tmp.message = _error_message;
|
293 - | }
|
294 249 | tmp
|
295 250 | })
|
296 251 | }
|
297 252 | "XksProxyVpcEndpointServiceInvalidConfigurationException" => {
|
298 253 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::XksProxyVpcEndpointServiceInvalidConfigurationException({
|
299 254 | #[allow(unused_mut)]
|
300 255 | let mut tmp = {
|
301 256 | #[allow(unused_mut)]
|
302 257 | let mut output = crate::types::error::builders::XksProxyVpcEndpointServiceInvalidConfigurationExceptionBuilder::default();
|
303 258 | output = crate::protocol_serde::shape_xks_proxy_vpc_endpoint_service_invalid_configuration_exception::de_xks_proxy_vpc_endpoint_service_invalid_configuration_exception_json_err(_response_body, output).map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
304 259 | let output = output.meta(generic);
|
305 260 | output.build()
|
306 261 | };
|
307 - | if tmp.message.is_none() {
|
308 - | tmp.message = _error_message;
|
309 - | }
|
310 262 | tmp
|
311 263 | })
|
312 264 | }
|
313 265 | "XksProxyVpcEndpointServiceNotFoundException" => {
|
314 266 | crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::XksProxyVpcEndpointServiceNotFoundException({
|
315 267 | #[allow(unused_mut)]
|
316 268 | let mut tmp = {
|
317 269 | #[allow(unused_mut)]
|
318 270 | let mut output = crate::types::error::builders::XksProxyVpcEndpointServiceNotFoundExceptionBuilder::default();
|
319 271 | output = crate::protocol_serde::shape_xks_proxy_vpc_endpoint_service_not_found_exception::de_xks_proxy_vpc_endpoint_service_not_found_exception_json_err(_response_body, output).map_err(crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::unhandled)?;
|
320 272 | let output = output.meta(generic);
|
321 273 | output.build()
|
322 274 | };
|
323 - | if tmp.message.is_none() {
|
324 - | tmp.message = _error_message;
|
325 - | }
|
326 275 | tmp
|
327 276 | })
|
328 277 | }
|
329 278 | _ => crate::operation::update_custom_key_store::UpdateCustomKeyStoreError::generic(generic),
|
330 279 | })
|
331 280 | }
|
332 281 |
|
333 282 | #[allow(clippy::unnecessary_wraps)]
|
334 283 | pub fn de_update_custom_key_store_http_response(
|
335 284 | _response_status: u16,
|