10 10 | > {
|
11 11 | #[allow(unused_mut)]
|
12 12 | let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
|
13 13 | .map_err(crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::unhandled)?;
|
14 14 | generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
|
15 15 | let generic = generic_builder.build();
|
16 16 | let error_code = match generic.code() {
|
17 17 | Some(code) => code,
|
18 18 | None => {
|
19 19 | return Err(crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::unhandled(
|
20 20 | generic,
|
21 21 | ))
|
22 22 | }
|
23 23 | };
|
24 24 |
|
25 25 | let _error_message = generic.message().map(|msg| msg.to_owned());
|
26 26 | Err(match error_code {
|
27 27 | "ConcurrentModification" => crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::ConcurrentModificationException({
|
28 28 | #[allow(unused_mut)]
|
29 29 | let mut tmp = {
|
30 30 | #[allow(unused_mut)]
|
31 31 | let mut output = crate::types::error::builders::ConcurrentModificationExceptionBuilder::default();
|
32 32 | output = crate::protocol_serde::shape_concurrent_modification_exception::de_concurrent_modification_exception_xml_err(
|
33 33 | _response_body,
|
34 34 | output,
|
35 35 | )
|
36 36 | .map_err(crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::unhandled)?;
|
37 37 | let output = output.meta(generic);
|
38 38 | output.build()
|
39 39 | };
|
40 - | if tmp.message.is_none() {
|
41 - | tmp.message = _error_message;
|
42 - | }
|
43 40 | tmp
|
44 41 | }),
|
45 42 | "InvalidInput" => crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::InvalidInputException({
|
46 43 | #[allow(unused_mut)]
|
47 44 | let mut tmp = {
|
48 45 | #[allow(unused_mut)]
|
49 46 | let mut output = crate::types::error::builders::InvalidInputExceptionBuilder::default();
|
50 47 | output = crate::protocol_serde::shape_invalid_input_exception::de_invalid_input_exception_xml_err(_response_body, output)
|
51 48 | .map_err(crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::unhandled)?;
|
52 49 | let output = output.meta(generic);
|
53 50 | output.build()
|
54 51 | };
|
55 - | if tmp.message.is_none() {
|
56 - | tmp.message = _error_message;
|
57 - | }
|
58 52 | tmp
|
59 53 | }),
|
60 54 | "LimitExceeded" => crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::LimitExceededException({
|
61 55 | #[allow(unused_mut)]
|
62 56 | let mut tmp = {
|
63 57 | #[allow(unused_mut)]
|
64 58 | let mut output = crate::types::error::builders::LimitExceededExceptionBuilder::default();
|
65 59 | output = crate::protocol_serde::shape_limit_exceeded_exception::de_limit_exceeded_exception_xml_err(_response_body, output)
|
66 60 | .map_err(crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::unhandled)?;
|
67 61 | let output = output.meta(generic);
|
68 62 | output.build()
|
69 63 | };
|
70 - | if tmp.message.is_none() {
|
71 - | tmp.message = _error_message;
|
72 - | }
|
73 64 | tmp
|
74 65 | }),
|
75 66 | "NoSuchEntity" => crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::NoSuchEntityException({
|
76 67 | #[allow(unused_mut)]
|
77 68 | let mut tmp = {
|
78 69 | #[allow(unused_mut)]
|
79 70 | let mut output = crate::types::error::builders::NoSuchEntityExceptionBuilder::default();
|
80 71 | output = crate::protocol_serde::shape_no_such_entity_exception::de_no_such_entity_exception_xml_err(_response_body, output)
|
81 72 | .map_err(crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::unhandled)?;
|
82 73 | let output = output.meta(generic);
|
83 74 | output.build()
|
84 75 | };
|
85 - | if tmp.message.is_none() {
|
86 - | tmp.message = _error_message;
|
87 - | }
|
88 76 | tmp
|
89 77 | }),
|
90 78 | "ServiceFailure" => crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::ServiceFailureException({
|
91 79 | #[allow(unused_mut)]
|
92 80 | let mut tmp = {
|
93 81 | #[allow(unused_mut)]
|
94 82 | let mut output = crate::types::error::builders::ServiceFailureExceptionBuilder::default();
|
95 83 | output = crate::protocol_serde::shape_service_failure_exception::de_service_failure_exception_xml_err(_response_body, output)
|
96 84 | .map_err(crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::unhandled)?;
|
97 85 | let output = output.meta(generic);
|
98 86 | output.build()
|
99 87 | };
|
100 - | if tmp.message.is_none() {
|
101 - | tmp.message = _error_message;
|
102 - | }
|
103 88 | tmp
|
104 89 | }),
|
105 90 | _ => crate::operation::tag_open_id_connect_provider::TagOpenIDConnectProviderError::generic(generic),
|
106 91 | })
|
107 92 | }
|
108 93 |
|
109 94 | #[allow(clippy::unnecessary_wraps)]
|
110 95 | pub fn de_tag_open_id_connect_provider_http_response(
|
111 96 | _response_status: u16,
|
112 97 | _response_headers: &::aws_smithy_runtime_api::http::Headers,
|