23 23 | "ConcurrentModification" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::ConcurrentModification({
|
24 24 | #[allow(unused_mut)]
|
25 25 | let mut tmp = {
|
26 26 | #[allow(unused_mut)]
|
27 27 | let mut output = crate::types::error::builders::ConcurrentModificationBuilder::default();
|
28 28 | output = crate::protocol_serde::shape_concurrent_modification::de_concurrent_modification_xml_err(_response_body, output)
|
29 29 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
30 30 | let output = output.meta(generic);
|
31 31 | output.build()
|
32 32 | };
|
33 - | if tmp.message.is_none() {
|
34 - | tmp.message = _error_message;
|
35 - | }
|
36 33 | tmp
|
37 34 | }),
|
38 35 | "InvalidArgument" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::InvalidArgument({
|
39 36 | #[allow(unused_mut)]
|
40 37 | let mut tmp = {
|
41 38 | #[allow(unused_mut)]
|
42 39 | let mut output = crate::types::error::builders::InvalidArgumentBuilder::default();
|
43 40 | output = crate::protocol_serde::shape_invalid_argument::de_invalid_argument_xml_err(_response_body, output)
|
44 41 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
45 42 | let output = output.meta(generic);
|
46 43 | output.build()
|
47 44 | };
|
48 - | if tmp.message.is_none() {
|
49 - | tmp.message = _error_message;
|
50 - | }
|
51 45 | tmp
|
52 46 | }),
|
53 47 | "InvalidInput" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::InvalidInput({
|
54 48 | #[allow(unused_mut)]
|
55 49 | let mut tmp = {
|
56 50 | #[allow(unused_mut)]
|
57 51 | let mut output = crate::types::error::builders::InvalidInputBuilder::default();
|
58 52 | output = crate::protocol_serde::shape_invalid_input::de_invalid_input_xml_err(_response_body, output)
|
59 53 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
60 54 | let output = output.meta(generic);
|
61 55 | output.build()
|
62 56 | };
|
63 - | if tmp.message.is_none() {
|
64 - | tmp.message = _error_message;
|
65 - | }
|
66 57 | tmp
|
67 58 | }),
|
68 59 | "InvalidKeySigningKeyName" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::InvalidKeySigningKeyName({
|
69 60 | #[allow(unused_mut)]
|
70 61 | let mut tmp = {
|
71 62 | #[allow(unused_mut)]
|
72 63 | let mut output = crate::types::error::builders::InvalidKeySigningKeyNameBuilder::default();
|
73 64 | output = crate::protocol_serde::shape_invalid_key_signing_key_name::de_invalid_key_signing_key_name_xml_err(_response_body, output)
|
74 65 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
75 66 | let output = output.meta(generic);
|
76 67 | output.build()
|
77 68 | };
|
78 - | if tmp.message.is_none() {
|
79 - | tmp.message = _error_message;
|
80 - | }
|
81 69 | tmp
|
82 70 | }),
|
83 71 | "InvalidKeySigningKeyStatus" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::InvalidKeySigningKeyStatus({
|
84 72 | #[allow(unused_mut)]
|
85 73 | let mut tmp = {
|
86 74 | #[allow(unused_mut)]
|
87 75 | let mut output = crate::types::error::builders::InvalidKeySigningKeyStatusBuilder::default();
|
88 76 | output =
|
89 77 | crate::protocol_serde::shape_invalid_key_signing_key_status::de_invalid_key_signing_key_status_xml_err(_response_body, output)
|
90 78 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
91 79 | let output = output.meta(generic);
|
92 80 | output.build()
|
93 81 | };
|
94 - | if tmp.message.is_none() {
|
95 - | tmp.message = _error_message;
|
96 - | }
|
97 82 | tmp
|
98 83 | }),
|
99 84 | "InvalidKMSArn" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::InvalidKmsArn({
|
100 85 | #[allow(unused_mut)]
|
101 86 | let mut tmp = {
|
102 87 | #[allow(unused_mut)]
|
103 88 | let mut output = crate::types::error::builders::InvalidKmsArnBuilder::default();
|
104 89 | output = crate::protocol_serde::shape_invalid_kms_arn::de_invalid_kms_arn_xml_err(_response_body, output)
|
105 90 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
106 91 | let output = output.meta(generic);
|
107 92 | output.build()
|
108 93 | };
|
109 - | if tmp.message.is_none() {
|
110 - | tmp.message = _error_message;
|
111 - | }
|
112 94 | tmp
|
113 95 | }),
|
114 96 | "InvalidSigningStatus" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::InvalidSigningStatus({
|
115 97 | #[allow(unused_mut)]
|
116 98 | let mut tmp = {
|
117 99 | #[allow(unused_mut)]
|
118 100 | let mut output = crate::types::error::builders::InvalidSigningStatusBuilder::default();
|
119 101 | output = crate::protocol_serde::shape_invalid_signing_status::de_invalid_signing_status_xml_err(_response_body, output)
|
120 102 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
121 103 | let output = output.meta(generic);
|
122 104 | output.build()
|
123 105 | };
|
124 - | if tmp.message.is_none() {
|
125 - | tmp.message = _error_message;
|
126 - | }
|
127 106 | tmp
|
128 107 | }),
|
129 108 | "KeySigningKeyAlreadyExists" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::KeySigningKeyAlreadyExists({
|
130 109 | #[allow(unused_mut)]
|
131 110 | let mut tmp = {
|
132 111 | #[allow(unused_mut)]
|
133 112 | let mut output = crate::types::error::builders::KeySigningKeyAlreadyExistsBuilder::default();
|
134 113 | output =
|
135 114 | crate::protocol_serde::shape_key_signing_key_already_exists::de_key_signing_key_already_exists_xml_err(_response_body, output)
|
136 115 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
137 116 | let output = output.meta(generic);
|
138 117 | output.build()
|
139 118 | };
|
140 - | if tmp.message.is_none() {
|
141 - | tmp.message = _error_message;
|
142 - | }
|
143 119 | tmp
|
144 120 | }),
|
145 121 | "NoSuchHostedZone" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::NoSuchHostedZone({
|
146 122 | #[allow(unused_mut)]
|
147 123 | let mut tmp = {
|
148 124 | #[allow(unused_mut)]
|
149 125 | let mut output = crate::types::error::builders::NoSuchHostedZoneBuilder::default();
|
150 126 | output = crate::protocol_serde::shape_no_such_hosted_zone::de_no_such_hosted_zone_xml_err(_response_body, output)
|
151 127 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
152 128 | let output = output.meta(generic);
|
153 129 | output.build()
|
154 130 | };
|
155 - | if tmp.message.is_none() {
|
156 - | tmp.message = _error_message;
|
157 - | }
|
158 131 | tmp
|
159 132 | }),
|
160 133 | "TooManyKeySigningKeys" => crate::operation::create_key_signing_key::CreateKeySigningKeyError::TooManyKeySigningKeys({
|
161 134 | #[allow(unused_mut)]
|
162 135 | let mut tmp = {
|
163 136 | #[allow(unused_mut)]
|
164 137 | let mut output = crate::types::error::builders::TooManyKeySigningKeysBuilder::default();
|
165 138 | output = crate::protocol_serde::shape_too_many_key_signing_keys::de_too_many_key_signing_keys_xml_err(_response_body, output)
|
166 139 | .map_err(crate::operation::create_key_signing_key::CreateKeySigningKeyError::unhandled)?;
|
167 140 | let output = output.meta(generic);
|
168 141 | output.build()
|
169 142 | };
|
170 - | if tmp.message.is_none() {
|
171 - | tmp.message = _error_message;
|
172 - | }
|
173 143 | tmp
|
174 144 | }),
|
175 145 | _ => crate::operation::create_key_signing_key::CreateKeySigningKeyError::generic(generic),
|
176 146 | })
|
177 147 | }
|
178 148 |
|
179 149 | #[allow(clippy::unnecessary_wraps)]
|
180 150 | pub fn de_create_key_signing_key_http_response(
|
181 151 | _response_status: u16,
|
182 152 | _response_headers: &::aws_smithy_runtime_api::http::Headers,
|