3 3 | pub fn de_put_role_permissions_boundary_http_error(
|
4 4 | _response_status: u16,
|
5 5 | _response_headers: &::aws_smithy_runtime_api::http::Headers,
|
6 6 | _response_body: &[u8],
|
7 7 | ) -> std::result::Result<
|
8 8 | crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryOutput,
|
9 9 | crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError,
|
10 10 | > {
|
11 11 | #[allow(unused_mut)]
|
12 12 | let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
|
13 13 | .map_err(crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::unhandled)?;
|
14 14 | generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
|
15 15 | let generic = generic_builder.build();
|
16 16 | let error_code = match generic.code() {
|
17 17 | Some(code) => code,
|
18 18 | None => return Err(crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::unhandled(generic)),
|
19 19 | };
|
20 20 |
|
21 21 | let _error_message = generic.message().map(|msg| msg.to_owned());
|
22 22 | Err(match error_code {
|
23 23 | "InvalidInput" => crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::InvalidInputException({
|
24 24 | #[allow(unused_mut)]
|
25 25 | let mut tmp = {
|
26 26 | #[allow(unused_mut)]
|
27 27 | let mut output = crate::types::error::builders::InvalidInputExceptionBuilder::default();
|
28 28 | output = crate::protocol_serde::shape_invalid_input_exception::de_invalid_input_exception_xml_err(_response_body, output)
|
29 29 | .map_err(crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::unhandled)?;
|
30 30 | let output = output.meta(generic);
|
31 31 | output.build()
|
32 32 | };
|
33 - | if tmp.message.is_none() {
|
34 - | tmp.message = _error_message;
|
35 - | }
|
36 33 | tmp
|
37 34 | }),
|
38 35 | "NoSuchEntity" => crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::NoSuchEntityException({
|
39 36 | #[allow(unused_mut)]
|
40 37 | let mut tmp = {
|
41 38 | #[allow(unused_mut)]
|
42 39 | let mut output = crate::types::error::builders::NoSuchEntityExceptionBuilder::default();
|
43 40 | output = crate::protocol_serde::shape_no_such_entity_exception::de_no_such_entity_exception_xml_err(_response_body, output)
|
44 41 | .map_err(crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::unhandled)?;
|
45 42 | let output = output.meta(generic);
|
46 43 | output.build()
|
47 44 | };
|
48 - | if tmp.message.is_none() {
|
49 - | tmp.message = _error_message;
|
50 - | }
|
51 45 | tmp
|
52 46 | }),
|
53 47 | "PolicyNotAttachable" => crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::PolicyNotAttachableException({
|
54 48 | #[allow(unused_mut)]
|
55 49 | let mut tmp = {
|
56 50 | #[allow(unused_mut)]
|
57 51 | let mut output = crate::types::error::builders::PolicyNotAttachableExceptionBuilder::default();
|
58 52 | output =
|
59 53 | crate::protocol_serde::shape_policy_not_attachable_exception::de_policy_not_attachable_exception_xml_err(_response_body, output)
|
60 54 | .map_err(crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::unhandled)?;
|
61 55 | let output = output.meta(generic);
|
62 56 | output.build()
|
63 57 | };
|
64 - | if tmp.message.is_none() {
|
65 - | tmp.message = _error_message;
|
66 - | }
|
67 58 | tmp
|
68 59 | }),
|
69 60 | "ServiceFailure" => crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::ServiceFailureException({
|
70 61 | #[allow(unused_mut)]
|
71 62 | let mut tmp = {
|
72 63 | #[allow(unused_mut)]
|
73 64 | let mut output = crate::types::error::builders::ServiceFailureExceptionBuilder::default();
|
74 65 | output = crate::protocol_serde::shape_service_failure_exception::de_service_failure_exception_xml_err(_response_body, output)
|
75 66 | .map_err(crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::unhandled)?;
|
76 67 | let output = output.meta(generic);
|
77 68 | output.build()
|
78 69 | };
|
79 - | if tmp.message.is_none() {
|
80 - | tmp.message = _error_message;
|
81 - | }
|
82 70 | tmp
|
83 71 | }),
|
84 72 | "UnmodifiableEntity" => crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::UnmodifiableEntityException({
|
85 73 | #[allow(unused_mut)]
|
86 74 | let mut tmp = {
|
87 75 | #[allow(unused_mut)]
|
88 76 | let mut output = crate::types::error::builders::UnmodifiableEntityExceptionBuilder::default();
|
89 77 | output = crate::protocol_serde::shape_unmodifiable_entity_exception::de_unmodifiable_entity_exception_xml_err(_response_body, output)
|
90 78 | .map_err(crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::unhandled)?;
|
91 79 | let output = output.meta(generic);
|
92 80 | output.build()
|
93 81 | };
|
94 - | if tmp.message.is_none() {
|
95 - | tmp.message = _error_message;
|
96 - | }
|
97 82 | tmp
|
98 83 | }),
|
99 84 | _ => crate::operation::put_role_permissions_boundary::PutRolePermissionsBoundaryError::generic(generic),
|
100 85 | })
|
101 86 | }
|
102 87 |
|
103 88 | #[allow(clippy::unnecessary_wraps)]
|
104 89 | pub fn de_put_role_permissions_boundary_http_response(
|
105 90 | _response_status: u16,
|
106 91 | _response_headers: &::aws_smithy_runtime_api::http::Headers,
|