26 26 | #[allow(unused_mut)]
|
27 27 | let mut output = crate::types::error::builders::CloudHsmClusterInUseExceptionBuilder::default();
|
28 28 | output = crate::protocol_serde::shape_cloud_hsm_cluster_in_use_exception::de_cloud_hsm_cluster_in_use_exception_json_err(
|
29 29 | _response_body,
|
30 30 | output,
|
31 31 | )
|
32 32 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
33 33 | let output = output.meta(generic);
|
34 34 | output.build()
|
35 35 | };
|
36 - | if tmp.message.is_none() {
|
37 - | tmp.message = _error_message;
|
38 - | }
|
39 36 | tmp
|
40 37 | }),
|
41 38 | "CloudHsmClusterInvalidConfigurationException" => {
|
42 39 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::CloudHsmClusterInvalidConfigurationException({
|
43 40 | #[allow(unused_mut)]
|
44 41 | let mut tmp = {
|
45 42 | #[allow(unused_mut)]
|
46 43 | let mut output = crate::types::error::builders::CloudHsmClusterInvalidConfigurationExceptionBuilder::default();
|
47 44 | output = crate::protocol_serde::shape_cloud_hsm_cluster_invalid_configuration_exception::de_cloud_hsm_cluster_invalid_configuration_exception_json_err(_response_body, output).map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
48 45 | let output = output.meta(generic);
|
49 46 | output.build()
|
50 47 | };
|
51 - | if tmp.message.is_none() {
|
52 - | tmp.message = _error_message;
|
53 - | }
|
54 48 | tmp
|
55 49 | })
|
56 50 | }
|
57 51 | "CloudHsmClusterNotActiveException" => {
|
58 52 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::CloudHsmClusterNotActiveException({
|
59 53 | #[allow(unused_mut)]
|
60 54 | let mut tmp = {
|
61 55 | #[allow(unused_mut)]
|
62 56 | let mut output = crate::types::error::builders::CloudHsmClusterNotActiveExceptionBuilder::default();
|
63 57 | output = crate::protocol_serde::shape_cloud_hsm_cluster_not_active_exception::de_cloud_hsm_cluster_not_active_exception_json_err(
|
64 58 | _response_body,
|
65 59 | output,
|
66 60 | )
|
67 61 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
68 62 | let output = output.meta(generic);
|
69 63 | output.build()
|
70 64 | };
|
71 - | if tmp.message.is_none() {
|
72 - | tmp.message = _error_message;
|
73 - | }
|
74 65 | tmp
|
75 66 | })
|
76 67 | }
|
77 68 | "CloudHsmClusterNotFoundException" => {
|
78 69 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::CloudHsmClusterNotFoundException({
|
79 70 | #[allow(unused_mut)]
|
80 71 | let mut tmp = {
|
81 72 | #[allow(unused_mut)]
|
82 73 | let mut output = crate::types::error::builders::CloudHsmClusterNotFoundExceptionBuilder::default();
|
83 74 | output = crate::protocol_serde::shape_cloud_hsm_cluster_not_found_exception::de_cloud_hsm_cluster_not_found_exception_json_err(
|
84 75 | _response_body,
|
85 76 | output,
|
86 77 | )
|
87 78 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
88 79 | let output = output.meta(generic);
|
89 80 | output.build()
|
90 81 | };
|
91 - | if tmp.message.is_none() {
|
92 - | tmp.message = _error_message;
|
93 - | }
|
94 82 | tmp
|
95 83 | })
|
96 84 | }
|
97 85 | "CustomKeyStoreNameInUseException" => {
|
98 86 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::CustomKeyStoreNameInUseException({
|
99 87 | #[allow(unused_mut)]
|
100 88 | let mut tmp = {
|
101 89 | #[allow(unused_mut)]
|
102 90 | let mut output = crate::types::error::builders::CustomKeyStoreNameInUseExceptionBuilder::default();
|
103 91 | output = crate::protocol_serde::shape_custom_key_store_name_in_use_exception::de_custom_key_store_name_in_use_exception_json_err(
|
104 92 | _response_body,
|
105 93 | output,
|
106 94 | )
|
107 95 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
108 96 | let output = output.meta(generic);
|
109 97 | output.build()
|
110 98 | };
|
111 - | if tmp.message.is_none() {
|
112 - | tmp.message = _error_message;
|
113 - | }
|
114 99 | tmp
|
115 100 | })
|
116 101 | }
|
117 102 | "IncorrectTrustAnchorException" => crate::operation::create_custom_key_store::CreateCustomKeyStoreError::IncorrectTrustAnchorException({
|
118 103 | #[allow(unused_mut)]
|
119 104 | let mut tmp = {
|
120 105 | #[allow(unused_mut)]
|
121 106 | let mut output = crate::types::error::builders::IncorrectTrustAnchorExceptionBuilder::default();
|
122 107 | output = crate::protocol_serde::shape_incorrect_trust_anchor_exception::de_incorrect_trust_anchor_exception_json_err(
|
123 108 | _response_body,
|
124 109 | output,
|
125 110 | )
|
126 111 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
127 112 | let output = output.meta(generic);
|
128 113 | output.build()
|
129 114 | };
|
130 - | if tmp.message.is_none() {
|
131 - | tmp.message = _error_message;
|
132 - | }
|
133 115 | tmp
|
134 116 | }),
|
135 117 | "KMSInternalException" => crate::operation::create_custom_key_store::CreateCustomKeyStoreError::KmsInternalException({
|
136 118 | #[allow(unused_mut)]
|
137 119 | let mut tmp = {
|
138 120 | #[allow(unused_mut)]
|
139 121 | let mut output = crate::types::error::builders::KmsInternalExceptionBuilder::default();
|
140 122 | output = crate::protocol_serde::shape_kms_internal_exception::de_kms_internal_exception_json_err(_response_body, output)
|
141 123 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
142 124 | let output = output.meta(generic);
|
143 125 | output.build()
|
144 126 | };
|
145 - | if tmp.message.is_none() {
|
146 - | tmp.message = _error_message;
|
147 - | }
|
148 127 | tmp
|
149 128 | }),
|
150 129 | "LimitExceededException" => crate::operation::create_custom_key_store::CreateCustomKeyStoreError::LimitExceededException({
|
151 130 | #[allow(unused_mut)]
|
152 131 | let mut tmp = {
|
153 132 | #[allow(unused_mut)]
|
154 133 | let mut output = crate::types::error::builders::LimitExceededExceptionBuilder::default();
|
155 134 | output = crate::protocol_serde::shape_limit_exceeded_exception::de_limit_exceeded_exception_json_err(_response_body, output)
|
156 135 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
157 136 | let output = output.meta(generic);
|
158 137 | output.build()
|
159 138 | };
|
160 - | if tmp.message.is_none() {
|
161 - | tmp.message = _error_message;
|
162 - | }
|
163 139 | tmp
|
164 140 | }),
|
165 141 | "XksProxyIncorrectAuthenticationCredentialException" => {
|
166 142 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::XksProxyIncorrectAuthenticationCredentialException({
|
167 143 | #[allow(unused_mut)]
|
168 144 | let mut tmp = {
|
169 145 | #[allow(unused_mut)]
|
170 146 | let mut output = crate::types::error::builders::XksProxyIncorrectAuthenticationCredentialExceptionBuilder::default();
|
171 147 | output = crate::protocol_serde::shape_xks_proxy_incorrect_authentication_credential_exception::de_xks_proxy_incorrect_authentication_credential_exception_json_err(_response_body, output).map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
172 148 | let output = output.meta(generic);
|
173 149 | output.build()
|
174 150 | };
|
175 - | if tmp.message.is_none() {
|
176 - | tmp.message = _error_message;
|
177 - | }
|
178 151 | tmp
|
179 152 | })
|
180 153 | }
|
181 154 | "XksProxyInvalidConfigurationException" => {
|
182 155 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::XksProxyInvalidConfigurationException({
|
183 156 | #[allow(unused_mut)]
|
184 157 | let mut tmp = {
|
185 158 | #[allow(unused_mut)]
|
186 159 | let mut output = crate::types::error::builders::XksProxyInvalidConfigurationExceptionBuilder::default();
|
187 160 | output = crate::protocol_serde::shape_xks_proxy_invalid_configuration_exception::de_xks_proxy_invalid_configuration_exception_json_err(_response_body, output).map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
188 161 | let output = output.meta(generic);
|
189 162 | output.build()
|
190 163 | };
|
191 - | if tmp.message.is_none() {
|
192 - | tmp.message = _error_message;
|
193 - | }
|
194 164 | tmp
|
195 165 | })
|
196 166 | }
|
197 167 | "XksProxyInvalidResponseException" => {
|
198 168 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::XksProxyInvalidResponseException({
|
199 169 | #[allow(unused_mut)]
|
200 170 | let mut tmp = {
|
201 171 | #[allow(unused_mut)]
|
202 172 | let mut output = crate::types::error::builders::XksProxyInvalidResponseExceptionBuilder::default();
|
203 173 | output = crate::protocol_serde::shape_xks_proxy_invalid_response_exception::de_xks_proxy_invalid_response_exception_json_err(
|
204 174 | _response_body,
|
205 175 | output,
|
206 176 | )
|
207 177 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
208 178 | let output = output.meta(generic);
|
209 179 | output.build()
|
210 180 | };
|
211 - | if tmp.message.is_none() {
|
212 - | tmp.message = _error_message;
|
213 - | }
|
214 181 | tmp
|
215 182 | })
|
216 183 | }
|
217 184 | "XksProxyUriEndpointInUseException" => {
|
218 185 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::XksProxyUriEndpointInUseException({
|
219 186 | #[allow(unused_mut)]
|
220 187 | let mut tmp = {
|
221 188 | #[allow(unused_mut)]
|
222 189 | let mut output = crate::types::error::builders::XksProxyUriEndpointInUseExceptionBuilder::default();
|
223 190 | output =
|
224 191 | crate::protocol_serde::shape_xks_proxy_uri_endpoint_in_use_exception::de_xks_proxy_uri_endpoint_in_use_exception_json_err(
|
225 192 | _response_body,
|
226 193 | output,
|
227 194 | )
|
228 195 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
229 196 | let output = output.meta(generic);
|
230 197 | output.build()
|
231 198 | };
|
232 - | if tmp.message.is_none() {
|
233 - | tmp.message = _error_message;
|
234 - | }
|
235 199 | tmp
|
236 200 | })
|
237 201 | }
|
238 202 | "XksProxyUriInUseException" => crate::operation::create_custom_key_store::CreateCustomKeyStoreError::XksProxyUriInUseException({
|
239 203 | #[allow(unused_mut)]
|
240 204 | let mut tmp = {
|
241 205 | #[allow(unused_mut)]
|
242 206 | let mut output = crate::types::error::builders::XksProxyUriInUseExceptionBuilder::default();
|
243 207 | output =
|
244 208 | crate::protocol_serde::shape_xks_proxy_uri_in_use_exception::de_xks_proxy_uri_in_use_exception_json_err(_response_body, output)
|
245 209 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
246 210 | let output = output.meta(generic);
|
247 211 | output.build()
|
248 212 | };
|
249 - | if tmp.message.is_none() {
|
250 - | tmp.message = _error_message;
|
251 - | }
|
252 213 | tmp
|
253 214 | }),
|
254 215 | "XksProxyUriUnreachableException" => crate::operation::create_custom_key_store::CreateCustomKeyStoreError::XksProxyUriUnreachableException({
|
255 216 | #[allow(unused_mut)]
|
256 217 | let mut tmp = {
|
257 218 | #[allow(unused_mut)]
|
258 219 | let mut output = crate::types::error::builders::XksProxyUriUnreachableExceptionBuilder::default();
|
259 220 | output = crate::protocol_serde::shape_xks_proxy_uri_unreachable_exception::de_xks_proxy_uri_unreachable_exception_json_err(
|
260 221 | _response_body,
|
261 222 | output,
|
262 223 | )
|
263 224 | .map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
264 225 | let output = output.meta(generic);
|
265 226 | output.build()
|
266 227 | };
|
267 - | if tmp.message.is_none() {
|
268 - | tmp.message = _error_message;
|
269 - | }
|
270 228 | tmp
|
271 229 | }),
|
272 230 | "XksProxyVpcEndpointServiceInUseException" => {
|
273 231 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::XksProxyVpcEndpointServiceInUseException({
|
274 232 | #[allow(unused_mut)]
|
275 233 | let mut tmp = {
|
276 234 | #[allow(unused_mut)]
|
277 235 | let mut output = crate::types::error::builders::XksProxyVpcEndpointServiceInUseExceptionBuilder::default();
|
278 236 | output = crate::protocol_serde::shape_xks_proxy_vpc_endpoint_service_in_use_exception::de_xks_proxy_vpc_endpoint_service_in_use_exception_json_err(_response_body, output).map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
279 237 | let output = output.meta(generic);
|
280 238 | output.build()
|
281 239 | };
|
282 - | if tmp.message.is_none() {
|
283 - | tmp.message = _error_message;
|
284 - | }
|
285 240 | tmp
|
286 241 | })
|
287 242 | }
|
288 243 | "XksProxyVpcEndpointServiceInvalidConfigurationException" => {
|
289 244 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::XksProxyVpcEndpointServiceInvalidConfigurationException({
|
290 245 | #[allow(unused_mut)]
|
291 246 | let mut tmp = {
|
292 247 | #[allow(unused_mut)]
|
293 248 | let mut output = crate::types::error::builders::XksProxyVpcEndpointServiceInvalidConfigurationExceptionBuilder::default();
|
294 249 | output = crate::protocol_serde::shape_xks_proxy_vpc_endpoint_service_invalid_configuration_exception::de_xks_proxy_vpc_endpoint_service_invalid_configuration_exception_json_err(_response_body, output).map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
295 250 | let output = output.meta(generic);
|
296 251 | output.build()
|
297 252 | };
|
298 - | if tmp.message.is_none() {
|
299 - | tmp.message = _error_message;
|
300 - | }
|
301 253 | tmp
|
302 254 | })
|
303 255 | }
|
304 256 | "XksProxyVpcEndpointServiceNotFoundException" => {
|
305 257 | crate::operation::create_custom_key_store::CreateCustomKeyStoreError::XksProxyVpcEndpointServiceNotFoundException({
|
306 258 | #[allow(unused_mut)]
|
307 259 | let mut tmp = {
|
308 260 | #[allow(unused_mut)]
|
309 261 | let mut output = crate::types::error::builders::XksProxyVpcEndpointServiceNotFoundExceptionBuilder::default();
|
310 262 | output = crate::protocol_serde::shape_xks_proxy_vpc_endpoint_service_not_found_exception::de_xks_proxy_vpc_endpoint_service_not_found_exception_json_err(_response_body, output).map_err(crate::operation::create_custom_key_store::CreateCustomKeyStoreError::unhandled)?;
|
311 263 | let output = output.meta(generic);
|
312 264 | output.build()
|
313 265 | };
|
314 - | if tmp.message.is_none() {
|
315 - | tmp.message = _error_message;
|
316 - | }
|
317 266 | tmp
|
318 267 | })
|
319 268 | }
|
320 269 | _ => crate::operation::create_custom_key_store::CreateCustomKeyStoreError::generic(generic),
|
321 270 | })
|
322 271 | }
|
323 272 |
|
324 273 | #[allow(clippy::unnecessary_wraps)]
|
325 274 | pub fn de_create_custom_key_store_http_response(
|
326 275 | _response_status: u16,
|