aws_sdk_sts/operation/
assume_role_with_web_identity.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2/// Orchestration and serialization glue logic for `AssumeRoleWithWebIdentity`.
3#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
4#[non_exhaustive]
5pub struct AssumeRoleWithWebIdentity;
6impl AssumeRoleWithWebIdentity {
7    /// Creates a new `AssumeRoleWithWebIdentity`
8    pub fn new() -> Self {
9        Self
10    }
11    pub(crate) async fn orchestrate(
12                        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
13                        input: crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput,
14                    ) -> ::std::result::Result<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityOutput, ::aws_smithy_runtime_api::client::result::SdkError<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>> {
15                        let map_err = |err: ::aws_smithy_runtime_api::client::result::SdkError<::aws_smithy_runtime_api::client::interceptors::context::Error, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>| {
16                            err.map_service_error(|err| {
17                                err.downcast::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>().expect("correct error type")
18                            })
19                        };
20                        let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
21                            .await
22                            .map_err(map_err)?;
23                        let output = context.finalize().map_err(map_err)?;
24                        ::std::result::Result::Ok(output.downcast::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityOutput>().expect("correct output type"))
25                    }
26    
27                    pub(crate) async fn orchestrate_with_stop_point(
28                        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
29                        input: crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput,
30                        stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
31                    ) -> ::std::result::Result<::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext, ::aws_smithy_runtime_api::client::result::SdkError<::aws_smithy_runtime_api::client::interceptors::context::Error, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>> {
32                        let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
33                        use ::tracing::Instrument;
34                        ::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point(
35                            "STS",
36                            "AssumeRoleWithWebIdentity",
37                            input,
38                            runtime_plugins,
39                            stop_point
40                        )
41                        // Create a parent span for the entire operation. Includes a random, internal-only,
42                        // seven-digit ID for the operation orchestration so that it can be correlated in the logs.
43                        .instrument(::tracing::debug_span!(
44                                "STS.AssumeRoleWithWebIdentity",
45                                "rpc.service" = "STS",
46                                "rpc.method" = "AssumeRoleWithWebIdentity",
47                                "sdk_invocation_id" = ::fastrand::u32(1_000_000..10_000_000),
48                                "rpc.system" = "aws-api",
49                            ))
50                        .await
51                    }
52    
53                    pub(crate) fn operation_runtime_plugins(
54                        client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
55                        client_config: &crate::config::Config,
56                        config_override: ::std::option::Option<crate::config::Builder>,
57                    ) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
58                        let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
59                        
60                        if let ::std::option::Option::Some(config_override) = config_override {
61                            for plugin in config_override.runtime_plugins.iter().cloned() {
62                                runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
63                            }
64                            runtime_plugins = runtime_plugins.with_operation_plugin(
65                                crate::config::ConfigOverrideRuntimePlugin::new(config_override, client_config.config.clone(), &client_config.runtime_components)
66                            );
67                        }
68                        runtime_plugins
69                    }
70}
71impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for AssumeRoleWithWebIdentity {
72                fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
73                    let mut cfg = ::aws_smithy_types::config_bag::Layer::new("AssumeRoleWithWebIdentity");
74
75                    cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(AssumeRoleWithWebIdentityRequestSerializer));
76                    cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(AssumeRoleWithWebIdentityResponseDeserializer));
77
78                    cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(
79                        crate::config::auth::Params::builder()
80                            .operation_name("AssumeRoleWithWebIdentity")
81                            .build()
82                            .expect("required fields set")
83                    ));
84
85                    cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::SensitiveOutput);
86cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new(
87                            "AssumeRoleWithWebIdentity",
88                            "STS",
89                        ));
90
91                    ::std::option::Option::Some(cfg.freeze())
92                }
93
94                fn runtime_components(&self, _: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
95                    #[allow(unused_mut)]
96                    let mut rcb = ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("AssumeRoleWithWebIdentity")
97                            .with_interceptor(::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default())
98.with_interceptor(AssumeRoleWithWebIdentityEndpointParamsInterceptor)
99                            .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>::new())
100.with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>::new())
101.with_retry_classifier(::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>::new());
102
103                    ::std::borrow::Cow::Owned(rcb)
104                }
105            }
106
107            
108#[derive(Debug)]
109            struct AssumeRoleWithWebIdentityResponseDeserializer;
110            impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for AssumeRoleWithWebIdentityResponseDeserializer {
111                
112
113                fn deserialize_nonstreaming(&self, response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
114                    let (success, status) = (response.status().is_success(), response.status().as_u16());
115            let headers = response.headers();
116            let body = response.body().bytes().expect("body loaded");
117            #[allow(unused_mut)]
118            let mut force_error = false;
119            ::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
120            let parse_result = if !success && status != 200 || force_error {
121                crate::protocol_serde::shape_assume_role_with_web_identity::de_assume_role_with_web_identity_http_error(status, headers, body)
122            } else {
123                crate::protocol_serde::shape_assume_role_with_web_identity::de_assume_role_with_web_identity_http_response(status, headers, body)
124            };
125            crate::protocol_serde::type_erase_result(parse_result)
126                }
127            }
128#[derive(Debug)]
129            struct AssumeRoleWithWebIdentityRequestSerializer;
130            impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for AssumeRoleWithWebIdentityRequestSerializer {
131                #[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
132                fn serialize_input(&self, input: ::aws_smithy_runtime_api::client::interceptors::context::Input, _cfg: &mut ::aws_smithy_types::config_bag::ConfigBag) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
133                    let input = input.downcast::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput>().expect("correct type");
134                    let _header_serialization_settings = _cfg.load::<crate::serialization_settings::HeaderSerializationSettings>().cloned().unwrap_or_default();
135                    let mut request_builder = {
136                        #[allow(clippy::uninlined_format_args)]
137fn uri_base(_input: &crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput, output: &mut ::std::string::String) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
138    use ::std::fmt::Write as _;
139    ::std::write!(output, "/").expect("formatting should succeed");
140    ::std::result::Result::Ok(())
141}
142#[allow(clippy::unnecessary_wraps)]
143fn update_http_builder(
144                input: &crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput,
145                builder: ::http::request::Builder
146            ) -> ::std::result::Result<::http::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
147    let mut uri = ::std::string::String::new();
148    uri_base(input, &mut uri)?;
149    ::std::result::Result::Ok(builder.method("POST").uri(uri))
150}
151let mut builder = update_http_builder(&input, ::http::request::Builder::new())?;
152builder = _header_serialization_settings.set_default_header(builder, ::http::header::CONTENT_TYPE, "application/x-www-form-urlencoded");
153builder
154                    };
155                    let body = ::aws_smithy_types::body::SdkBody::from(crate::protocol_serde::shape_assume_role_with_web_identity_input::ser_assume_role_with_web_identity_input_input_input(&input)?);
156                    if let Some(content_length) = body.content_length() {
157                                let content_length = content_length.to_string();
158                                request_builder = _header_serialization_settings.set_default_header(request_builder, ::http::header::CONTENT_LENGTH, &content_length);
159                            }
160                    ::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
161                }
162            }
163#[derive(Debug)]
164            struct AssumeRoleWithWebIdentityEndpointParamsInterceptor;
165
166            impl ::aws_smithy_runtime_api::client::interceptors::Intercept for AssumeRoleWithWebIdentityEndpointParamsInterceptor {
167                fn name(&self) -> &'static str {
168                    "AssumeRoleWithWebIdentityEndpointParamsInterceptor"
169                }
170
171                fn read_before_execution(
172                    &self,
173                    context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<'_, ::aws_smithy_runtime_api::client::interceptors::context::Input, ::aws_smithy_runtime_api::client::interceptors::context::Output, ::aws_smithy_runtime_api::client::interceptors::context::Error>,
174                    cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
175                ) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
176                    let _input = context.input()
177                        .downcast_ref::<AssumeRoleWithWebIdentityInput>()
178                        .ok_or("failed to downcast to AssumeRoleWithWebIdentityInput")?;
179
180                    
181
182                    let params = crate::config::endpoint::Params::builder()
183                        .set_region(cfg.load::<::aws_types::region::Region>().map(|r|r.as_ref().to_owned()))
184.set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
185.set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
186.set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
187                        .build()
188                        .map_err(|err| ::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err))?;
189                    cfg.interceptor_state().store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
190                    ::std::result::Result::Ok(())
191                }
192            }
193
194            // The get_* functions below are generated from JMESPath expressions in the
195            // operationContextParams trait. They target the operation's input shape.
196
197            
198
199/// Error type for the `AssumeRoleWithWebIdentityError` operation.
200#[non_exhaustive]
201#[derive(::std::fmt::Debug)]
202pub enum AssumeRoleWithWebIdentityError {
203    /// <p>The web identity token that was passed is expired or is not valid. Get a new identity token from the identity provider and then retry the request.</p>
204    ExpiredTokenException(crate::types::error::ExpiredTokenException),
205    /// <p>The request could not be fulfilled because the identity provider (IDP) that was asked to verify the incoming identity token could not be reached. This is often a transient error caused by network conditions. Retry the request a limited number of times so that you don't exceed the request rate. If the error persists, the identity provider might be down or not responding.</p>
206    IdpCommunicationErrorException(crate::types::error::IdpCommunicationErrorException),
207    /// <p>The identity provider (IdP) reported that authentication failed. This might be because the claim is invalid.</p>
208    /// <p>If this error is returned for the <code>AssumeRoleWithWebIdentity</code> operation, it can also mean that the claim has expired or has been explicitly revoked.</p>
209    IdpRejectedClaimException(crate::types::error::IdpRejectedClaimException),
210    /// <p>The web identity token that was passed could not be validated by Amazon Web Services. Get a new identity token from the identity provider and then retry the request.</p>
211    InvalidIdentityTokenException(crate::types::error::InvalidIdentityTokenException),
212    /// <p>The request was rejected because the policy document was malformed. The error message describes the specific error.</p>
213    MalformedPolicyDocumentException(crate::types::error::MalformedPolicyDocumentException),
214    /// <p>The request was rejected because the total packed size of the session policies and session tags combined was too large. An Amazon Web Services conversion compresses the session policy document, session policy ARNs, and session tags into a packed binary format that has a separate limit. The error message indicates by percentage how close the policies and tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the <i>IAM User Guide</i>.</p>
215    /// <p>You could receive this error even though you meet other defined session policy and session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User Guide</i>.</p>
216    PackedPolicyTooLargeException(crate::types::error::PackedPolicyTooLargeException),
217    /// <p>STS is not activated in the requested region for the account that is being asked to generate credentials. The account administrator must use the IAM console to activate STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User Guide</i>.</p>
218    RegionDisabledException(crate::types::error::RegionDisabledException),
219    /// An unexpected error occurred (e.g., invalid JSON returned by the service or an unknown error code).
220                    #[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
221    variable wildcard pattern and check `.code()`:
222     \
223    &nbsp;&nbsp;&nbsp;`err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
224     \
225    See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-AssumeRoleWithWebIdentityError) for what information is available for the error.")]
226                    Unhandled(crate::error::sealed_unhandled::Unhandled),
227}
228impl AssumeRoleWithWebIdentityError {
229    /// Creates the `AssumeRoleWithWebIdentityError::Unhandled` variant from any error type.
230                    pub fn unhandled(err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>) -> Self {
231                        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source: err.into(), meta: ::std::default::Default::default() })
232                    }
233    
234                    /// Creates the `AssumeRoleWithWebIdentityError::Unhandled` variant from an [`ErrorMetadata`](::aws_smithy_types::error::ErrorMetadata).
235                    pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
236                        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source: err.clone().into(), meta: err })
237                    }
238    /// 
239    /// Returns error metadata, which includes the error code, message,
240    /// request ID, and potentially additional information.
241    /// 
242    pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
243        match self {
244            Self::ExpiredTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
245            Self::IdpCommunicationErrorException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
246            Self::IdpRejectedClaimException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
247            Self::InvalidIdentityTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
248            Self::MalformedPolicyDocumentException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
249            Self::PackedPolicyTooLargeException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
250            Self::RegionDisabledException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
251            Self::Unhandled(e) => &e.meta,
252        }
253    }
254    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::ExpiredTokenException`.
255    pub fn is_expired_token_exception(&self) -> bool {
256        matches!(self, Self::ExpiredTokenException(_))
257    }
258    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::IdpCommunicationErrorException`.
259    pub fn is_idp_communication_error_exception(&self) -> bool {
260        matches!(self, Self::IdpCommunicationErrorException(_))
261    }
262    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::IdpRejectedClaimException`.
263    pub fn is_idp_rejected_claim_exception(&self) -> bool {
264        matches!(self, Self::IdpRejectedClaimException(_))
265    }
266    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::InvalidIdentityTokenException`.
267    pub fn is_invalid_identity_token_exception(&self) -> bool {
268        matches!(self, Self::InvalidIdentityTokenException(_))
269    }
270    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::MalformedPolicyDocumentException`.
271    pub fn is_malformed_policy_document_exception(&self) -> bool {
272        matches!(self, Self::MalformedPolicyDocumentException(_))
273    }
274    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::PackedPolicyTooLargeException`.
275    pub fn is_packed_policy_too_large_exception(&self) -> bool {
276        matches!(self, Self::PackedPolicyTooLargeException(_))
277    }
278    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::RegionDisabledException`.
279    pub fn is_region_disabled_exception(&self) -> bool {
280        matches!(self, Self::RegionDisabledException(_))
281    }
282}
283impl ::std::error::Error for AssumeRoleWithWebIdentityError {
284    fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
285        match self {
286            Self::ExpiredTokenException(_inner) =>
287            ::std::option::Option::Some(_inner)
288            ,
289            Self::IdpCommunicationErrorException(_inner) =>
290            ::std::option::Option::Some(_inner)
291            ,
292            Self::IdpRejectedClaimException(_inner) =>
293            ::std::option::Option::Some(_inner)
294            ,
295            Self::InvalidIdentityTokenException(_inner) =>
296            ::std::option::Option::Some(_inner)
297            ,
298            Self::MalformedPolicyDocumentException(_inner) =>
299            ::std::option::Option::Some(_inner)
300            ,
301            Self::PackedPolicyTooLargeException(_inner) =>
302            ::std::option::Option::Some(_inner)
303            ,
304            Self::RegionDisabledException(_inner) =>
305            ::std::option::Option::Some(_inner)
306            ,
307            Self::Unhandled(_inner) => {
308                ::std::option::Option::Some(&*_inner.source)
309            }
310        }
311    }
312}
313impl ::std::fmt::Display for AssumeRoleWithWebIdentityError {
314    fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
315        match self {
316            Self::ExpiredTokenException(_inner) =>
317            _inner.fmt(f)
318            ,
319            Self::IdpCommunicationErrorException(_inner) =>
320            _inner.fmt(f)
321            ,
322            Self::IdpRejectedClaimException(_inner) =>
323            _inner.fmt(f)
324            ,
325            Self::InvalidIdentityTokenException(_inner) =>
326            _inner.fmt(f)
327            ,
328            Self::MalformedPolicyDocumentException(_inner) =>
329            _inner.fmt(f)
330            ,
331            Self::PackedPolicyTooLargeException(_inner) =>
332            _inner.fmt(f)
333            ,
334            Self::RegionDisabledException(_inner) =>
335            _inner.fmt(f)
336            ,
337            Self::Unhandled(_inner) => {
338                if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
339                                                        write!(f, "unhandled error ({code})")
340                                                    } else {
341                                                        f.write_str("unhandled error")
342                                                    }
343            }
344        }
345    }
346}
347impl ::aws_smithy_types::retry::ProvideErrorKind for AssumeRoleWithWebIdentityError {
348    fn code(&self) -> ::std::option::Option<&str> {
349        ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
350    }
351    fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
352        match self {
353            Self::IdpCommunicationErrorException(inner) => ::std::option::Option::Some(inner.retryable_error_kind()),
354            _ => ::std::option::Option::None
355        }
356    }
357}
358impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for AssumeRoleWithWebIdentityError {
359    fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
360        match self {
361            Self::ExpiredTokenException(_inner) =>
362            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
363            ,
364            Self::IdpCommunicationErrorException(_inner) =>
365            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
366            ,
367            Self::IdpRejectedClaimException(_inner) =>
368            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
369            ,
370            Self::InvalidIdentityTokenException(_inner) =>
371            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
372            ,
373            Self::MalformedPolicyDocumentException(_inner) =>
374            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
375            ,
376            Self::PackedPolicyTooLargeException(_inner) =>
377            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
378            ,
379            Self::RegionDisabledException(_inner) =>
380            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
381            ,
382            Self::Unhandled(_inner) => {
383                &_inner.meta
384            }
385        }
386    }
387}
388impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for AssumeRoleWithWebIdentityError {
389    fn create_unhandled_error(
390                        source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
391                        meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>
392                    ) -> Self {
393        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source, meta: meta.unwrap_or_default() })
394    }
395}
396impl ::aws_types::request_id::RequestId for crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError {
397                                fn request_id(&self) -> Option<&str> {
398                                    self.meta().request_id()
399                                }
400                            }
401
402pub use crate::operation::assume_role_with_web_identity::_assume_role_with_web_identity_output::AssumeRoleWithWebIdentityOutput;
403
404pub use crate::operation::assume_role_with_web_identity::_assume_role_with_web_identity_input::AssumeRoleWithWebIdentityInput;
405
406mod _assume_role_with_web_identity_input;
407
408mod _assume_role_with_web_identity_output;
409
410/// Builders
411pub mod builders;
412