27 27 | "ConcurrentModification" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::ConcurrentModification({
|
28 28 | #[allow(unused_mut)]
|
29 29 | let mut tmp = {
|
30 30 | #[allow(unused_mut)]
|
31 31 | let mut output = crate::types::error::builders::ConcurrentModificationBuilder::default();
|
32 32 | output = crate::protocol_serde::shape_concurrent_modification::de_concurrent_modification_xml_err(_response_body, output)
|
33 33 | .map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
|
34 34 | let output = output.meta(generic);
|
35 35 | output.build()
|
36 36 | };
|
37 - | if tmp.message.is_none() {
|
38 - | tmp.message = _error_message;
|
39 - | }
|
40 37 | tmp
|
41 38 | }),
|
42 39 | "DNSSECNotFound" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::DnssecNotFound({
|
43 40 | #[allow(unused_mut)]
|
44 41 | let mut tmp = {
|
45 42 | #[allow(unused_mut)]
|
46 43 | let mut output = crate::types::error::builders::DnssecNotFoundBuilder::default();
|
47 44 | output = crate::protocol_serde::shape_dnssec_not_found::de_dnssec_not_found_xml_err(_response_body, output)
|
48 45 | .map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
|
49 46 | let output = output.meta(generic);
|
50 47 | output.build()
|
51 48 | };
|
52 - | if tmp.message.is_none() {
|
53 - | tmp.message = _error_message;
|
54 - | }
|
55 49 | tmp
|
56 50 | }),
|
57 51 | "HostedZonePartiallyDelegated" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::HostedZonePartiallyDelegated({
|
58 52 | #[allow(unused_mut)]
|
59 53 | let mut tmp = {
|
60 54 | #[allow(unused_mut)]
|
61 55 | let mut output = crate::types::error::builders::HostedZonePartiallyDelegatedBuilder::default();
|
62 56 | output =
|
63 57 | crate::protocol_serde::shape_hosted_zone_partially_delegated::de_hosted_zone_partially_delegated_xml_err(_response_body, output)
|
64 58 | .map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
|
65 59 | let output = output.meta(generic);
|
66 60 | output.build()
|
67 61 | };
|
68 - | if tmp.message.is_none() {
|
69 - | tmp.message = _error_message;
|
70 - | }
|
71 62 | tmp
|
72 63 | }),
|
73 64 | "InvalidArgument" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::InvalidArgument({
|
74 65 | #[allow(unused_mut)]
|
75 66 | let mut tmp = {
|
76 67 | #[allow(unused_mut)]
|
77 68 | let mut output = crate::types::error::builders::InvalidArgumentBuilder::default();
|
78 69 | output = crate::protocol_serde::shape_invalid_argument::de_invalid_argument_xml_err(_response_body, output)
|
79 70 | .map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
|
80 71 | let output = output.meta(generic);
|
81 72 | output.build()
|
82 73 | };
|
83 - | if tmp.message.is_none() {
|
84 - | tmp.message = _error_message;
|
85 - | }
|
86 74 | tmp
|
87 75 | }),
|
88 76 | "InvalidInput" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::InvalidInput({
|
89 77 | #[allow(unused_mut)]
|
90 78 | let mut tmp = {
|
91 79 | #[allow(unused_mut)]
|
92 80 | let mut output = crate::types::error::builders::InvalidInputBuilder::default();
|
93 81 | output = crate::protocol_serde::shape_invalid_input::de_invalid_input_xml_err(_response_body, output)
|
94 82 | .map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
|
95 83 | let output = output.meta(generic);
|
96 84 | output.build()
|
97 85 | };
|
98 - | if tmp.message.is_none() {
|
99 - | tmp.message = _error_message;
|
100 - | }
|
101 86 | tmp
|
102 87 | }),
|
103 88 | "InvalidKeySigningKeyStatus" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::InvalidKeySigningKeyStatus({
|
104 89 | #[allow(unused_mut)]
|
105 90 | let mut tmp = {
|
106 91 | #[allow(unused_mut)]
|
107 92 | let mut output = crate::types::error::builders::InvalidKeySigningKeyStatusBuilder::default();
|
108 93 | output =
|
109 94 | crate::protocol_serde::shape_invalid_key_signing_key_status::de_invalid_key_signing_key_status_xml_err(_response_body, output)
|
110 95 | .map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
|
111 96 | let output = output.meta(generic);
|
112 97 | output.build()
|
113 98 | };
|
114 - | if tmp.message.is_none() {
|
115 - | tmp.message = _error_message;
|
116 - | }
|
117 99 | tmp
|
118 100 | }),
|
119 101 | "InvalidKMSArn" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::InvalidKmsArn({
|
120 102 | #[allow(unused_mut)]
|
121 103 | let mut tmp = {
|
122 104 | #[allow(unused_mut)]
|
123 105 | let mut output = crate::types::error::builders::InvalidKmsArnBuilder::default();
|
124 106 | output = crate::protocol_serde::shape_invalid_kms_arn::de_invalid_kms_arn_xml_err(_response_body, output)
|
125 107 | .map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
|
126 108 | let output = output.meta(generic);
|
127 109 | output.build()
|
128 110 | };
|
129 - | if tmp.message.is_none() {
|
130 - | tmp.message = _error_message;
|
131 - | }
|
132 111 | tmp
|
133 112 | }),
|
134 113 | "KeySigningKeyWithActiveStatusNotFound" => {
|
135 114 | crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::KeySigningKeyWithActiveStatusNotFound({
|
136 115 | #[allow(unused_mut)]
|
137 116 | let mut tmp = {
|
138 117 | #[allow(unused_mut)]
|
139 118 | let mut output = crate::types::error::builders::KeySigningKeyWithActiveStatusNotFoundBuilder::default();
|
140 119 | output = crate::protocol_serde::shape_key_signing_key_with_active_status_not_found::de_key_signing_key_with_active_status_not_found_xml_err(_response_body, output).map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
|
141 120 | let output = output.meta(generic);
|
142 121 | output.build()
|
143 122 | };
|
144 - | if tmp.message.is_none() {
|
145 - | tmp.message = _error_message;
|
146 - | }
|
147 123 | tmp
|
148 124 | })
|
149 125 | }
|
150 126 | "NoSuchHostedZone" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::NoSuchHostedZone({
|
151 127 | #[allow(unused_mut)]
|
152 128 | let mut tmp = {
|
153 129 | #[allow(unused_mut)]
|
154 130 | let mut output = crate::types::error::builders::NoSuchHostedZoneBuilder::default();
|
155 131 | output = crate::protocol_serde::shape_no_such_hosted_zone::de_no_such_hosted_zone_xml_err(_response_body, output)
|
156 132 | .map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
|
157 133 | let output = output.meta(generic);
|
158 134 | output.build()
|
159 135 | };
|
160 - | if tmp.message.is_none() {
|
161 - | tmp.message = _error_message;
|
162 - | }
|
163 136 | tmp
|
164 137 | }),
|
165 138 | _ => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::generic(generic),
|
166 139 | })
|
167 140 | }
|
168 141 |
|
169 142 | #[allow(clippy::unnecessary_wraps)]
|
170 143 | pub fn de_enable_hosted_zone_dnssec_http_response(
|
171 144 | _response_status: u16,
|
172 145 | _response_headers: &::aws_smithy_runtime_api::http::Headers,
|