aws_sdk_sts/operation/
assume_role_with_web_identity.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2/// Orchestration and serialization glue logic for `AssumeRoleWithWebIdentity`.
3#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
4#[non_exhaustive]
5pub struct AssumeRoleWithWebIdentity;
6impl AssumeRoleWithWebIdentity {
7    /// Creates a new `AssumeRoleWithWebIdentity`
8    pub fn new() -> Self {
9        Self
10    }
11    pub(crate) async fn orchestrate(
12                        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
13                        input: crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput,
14                    ) -> ::std::result::Result<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityOutput, ::aws_smithy_runtime_api::client::result::SdkError<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>> {
15                        let map_err = |err: ::aws_smithy_runtime_api::client::result::SdkError<::aws_smithy_runtime_api::client::interceptors::context::Error, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>| {
16                            err.map_service_error(|err| {
17                                err.downcast::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>().expect("correct error type")
18                            })
19                        };
20                        let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
21                            .await
22                            .map_err(map_err)?;
23                        let output = context.finalize().map_err(map_err)?;
24                        ::std::result::Result::Ok(output.downcast::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityOutput>().expect("correct output type"))
25                    }
26    
27                    pub(crate) async fn orchestrate_with_stop_point(
28                        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
29                        input: crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput,
30                        stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
31                    ) -> ::std::result::Result<::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext, ::aws_smithy_runtime_api::client::result::SdkError<::aws_smithy_runtime_api::client::interceptors::context::Error, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>> {
32                        let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
33                        use ::tracing::Instrument;
34                        ::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point(
35                            "STS",
36                            "AssumeRoleWithWebIdentity",
37                            input,
38                            runtime_plugins,
39                            stop_point
40                        )
41                        // Create a parent span for the entire operation. Includes a random, internal-only,
42                        // seven-digit ID for the operation orchestration so that it can be correlated in the logs.
43                        .instrument(::tracing::debug_span!(
44                                "STS.AssumeRoleWithWebIdentity",
45                                "rpc.service" = "STS",
46                                "rpc.method" = "AssumeRoleWithWebIdentity",
47                                "sdk_invocation_id" = ::fastrand::u32(1_000_000..10_000_000),
48                                "rpc.system" = "aws-api",
49                            ))
50                        .await
51                    }
52    
53                    pub(crate) fn operation_runtime_plugins(
54                        client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
55                        client_config: &crate::config::Config,
56                        config_override: ::std::option::Option<crate::config::Builder>,
57                    ) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
58                        let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
59                        runtime_plugins = runtime_plugins
60                                        .with_client_plugin(crate::auth_plugin::DefaultAuthOptionsPlugin::new(vec![::aws_runtime::auth::sigv4::SCHEME_ID
61    , ::aws_smithy_runtime::client::auth::no_auth::NO_AUTH_SCHEME_ID]));
62                        if let ::std::option::Option::Some(config_override) = config_override {
63                            for plugin in config_override.runtime_plugins.iter().cloned() {
64                                runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
65                            }
66                            runtime_plugins = runtime_plugins.with_operation_plugin(
67                                crate::config::ConfigOverrideRuntimePlugin::new(config_override, client_config.config.clone(), &client_config.runtime_components)
68                            );
69                        }
70                        runtime_plugins
71                    }
72}
73impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for AssumeRoleWithWebIdentity {
74                fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
75                    let mut cfg = ::aws_smithy_types::config_bag::Layer::new("AssumeRoleWithWebIdentity");
76
77                    cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(AssumeRoleWithWebIdentityRequestSerializer));
78                    cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(AssumeRoleWithWebIdentityResponseDeserializer));
79
80                    
81                    cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(::aws_smithy_runtime_api::client::auth::static_resolver::StaticAuthSchemeOptionResolverParams::new()));
82
83                    cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::SensitiveOutput);
84cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new(
85                            "AssumeRoleWithWebIdentity",
86                            "STS",
87                        ));
88let mut signing_options = ::aws_runtime::auth::SigningOptions::default();
89                            signing_options.double_uri_encode = true;
90                            signing_options.content_sha256_header = false;
91                            signing_options.normalize_uri_path = true;
92                            signing_options.payload_override = None;
93
94                            cfg.store_put(::aws_runtime::auth::SigV4OperationSigningConfig {
95                                signing_options,
96                                ..::std::default::Default::default()
97                            });
98
99                    ::std::option::Option::Some(cfg.freeze())
100                }
101
102                fn runtime_components(&self, _: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
103                    #[allow(unused_mut)]
104                    let mut rcb = ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("AssumeRoleWithWebIdentity")
105                            .with_interceptor(::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default())
106.with_interceptor(AssumeRoleWithWebIdentityEndpointParamsInterceptor)
107                            .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>::new())
108.with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>::new())
109.with_retry_classifier(::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>::new());
110
111                    ::std::borrow::Cow::Owned(rcb)
112                }
113            }
114
115            
116#[derive(Debug)]
117            struct AssumeRoleWithWebIdentityResponseDeserializer;
118            impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for AssumeRoleWithWebIdentityResponseDeserializer {
119                
120
121                fn deserialize_nonstreaming(&self, response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
122                    let (success, status) = (response.status().is_success(), response.status().as_u16());
123            let headers = response.headers();
124            let body = response.body().bytes().expect("body loaded");
125            #[allow(unused_mut)]
126            let mut force_error = false;
127            ::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
128            let parse_result = if !success && status != 200 || force_error {
129                crate::protocol_serde::shape_assume_role_with_web_identity::de_assume_role_with_web_identity_http_error(status, headers, body)
130            } else {
131                crate::protocol_serde::shape_assume_role_with_web_identity::de_assume_role_with_web_identity_http_response(status, headers, body)
132            };
133            crate::protocol_serde::type_erase_result(parse_result)
134                }
135            }
136#[derive(Debug)]
137            struct AssumeRoleWithWebIdentityRequestSerializer;
138            impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for AssumeRoleWithWebIdentityRequestSerializer {
139                #[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
140                fn serialize_input(&self, input: ::aws_smithy_runtime_api::client::interceptors::context::Input, _cfg: &mut ::aws_smithy_types::config_bag::ConfigBag) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
141                    let input = input.downcast::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput>().expect("correct type");
142                    let _header_serialization_settings = _cfg.load::<crate::serialization_settings::HeaderSerializationSettings>().cloned().unwrap_or_default();
143                    let mut request_builder = {
144                        fn uri_base(_input: &crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput, output: &mut ::std::string::String) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
145    use ::std::fmt::Write as _;
146    ::std::write!(output, "/").expect("formatting should succeed");
147    ::std::result::Result::Ok(())
148}
149#[allow(clippy::unnecessary_wraps)]
150fn update_http_builder(
151                input: &crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput,
152                builder: ::http::request::Builder
153            ) -> ::std::result::Result<::http::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
154    let mut uri = ::std::string::String::new();
155    uri_base(input, &mut uri)?;
156    ::std::result::Result::Ok(builder.method("POST").uri(uri))
157}
158let mut builder = update_http_builder(&input, ::http::request::Builder::new())?;
159builder = _header_serialization_settings.set_default_header(builder, ::http::header::CONTENT_TYPE, "application/x-www-form-urlencoded");
160builder
161                    };
162                    let body = ::aws_smithy_types::body::SdkBody::from(crate::protocol_serde::shape_assume_role_with_web_identity_input::ser_assume_role_with_web_identity_input_input_input(&input)?);
163                    if let Some(content_length) = body.content_length() {
164                                let content_length = content_length.to_string();
165                                request_builder = _header_serialization_settings.set_default_header(request_builder, ::http::header::CONTENT_LENGTH, &content_length);
166                            }
167                    ::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
168                }
169            }
170#[derive(Debug)]
171            struct AssumeRoleWithWebIdentityEndpointParamsInterceptor;
172
173            impl ::aws_smithy_runtime_api::client::interceptors::Intercept for AssumeRoleWithWebIdentityEndpointParamsInterceptor {
174                fn name(&self) -> &'static str {
175                    "AssumeRoleWithWebIdentityEndpointParamsInterceptor"
176                }
177
178                fn read_before_execution(
179                    &self,
180                    context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<'_, ::aws_smithy_runtime_api::client::interceptors::context::Input, ::aws_smithy_runtime_api::client::interceptors::context::Output, ::aws_smithy_runtime_api::client::interceptors::context::Error>,
181                    cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
182                ) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
183                    let _input = context.input()
184                        .downcast_ref::<AssumeRoleWithWebIdentityInput>()
185                        .ok_or("failed to downcast to AssumeRoleWithWebIdentityInput")?;
186
187                    
188
189                    let params = crate::config::endpoint::Params::builder()
190                        .set_region(cfg.load::<::aws_types::region::Region>().map(|r|r.as_ref().to_owned()))
191.set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
192.set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
193.set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
194                        .build()
195                        .map_err(|err| ::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err))?;
196                    cfg.interceptor_state().store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
197                    ::std::result::Result::Ok(())
198                }
199            }
200
201            // The get_* functions below are generated from JMESPath expressions in the
202            // operationContextParams trait. They target the operation's input shape.
203
204            
205
206/// Error type for the `AssumeRoleWithWebIdentityError` operation.
207#[non_exhaustive]
208#[derive(::std::fmt::Debug)]
209pub enum AssumeRoleWithWebIdentityError {
210    /// <p>The web identity token that was passed is expired or is not valid. Get a new identity token from the identity provider and then retry the request.</p>
211    ExpiredTokenException(crate::types::error::ExpiredTokenException),
212    /// <p>The request could not be fulfilled because the identity provider (IDP) that was asked to verify the incoming identity token could not be reached. This is often a transient error caused by network conditions. Retry the request a limited number of times so that you don't exceed the request rate. If the error persists, the identity provider might be down or not responding.</p>
213    IdpCommunicationErrorException(crate::types::error::IdpCommunicationErrorException),
214    /// <p>The identity provider (IdP) reported that authentication failed. This might be because the claim is invalid.</p>
215    /// <p>If this error is returned for the <code>AssumeRoleWithWebIdentity</code> operation, it can also mean that the claim has expired or has been explicitly revoked.</p>
216    IdpRejectedClaimException(crate::types::error::IdpRejectedClaimException),
217    /// <p>The web identity token that was passed could not be validated by Amazon Web Services. Get a new identity token from the identity provider and then retry the request.</p>
218    InvalidIdentityTokenException(crate::types::error::InvalidIdentityTokenException),
219    /// <p>The request was rejected because the policy document was malformed. The error message describes the specific error.</p>
220    MalformedPolicyDocumentException(crate::types::error::MalformedPolicyDocumentException),
221    /// <p>The request was rejected because the total packed size of the session policies and session tags combined was too large. An Amazon Web Services conversion compresses the session policy document, session policy ARNs, and session tags into a packed binary format that has a separate limit. The error message indicates by percentage how close the policies and tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the <i>IAM User Guide</i>.</p>
222    /// <p>You could receive this error even though you meet other defined session policy and session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User Guide</i>.</p>
223    PackedPolicyTooLargeException(crate::types::error::PackedPolicyTooLargeException),
224    /// <p>STS is not activated in the requested region for the account that is being asked to generate credentials. The account administrator must use the IAM console to activate STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User Guide</i>.</p>
225    RegionDisabledException(crate::types::error::RegionDisabledException),
226    /// An unexpected error occurred (e.g., invalid JSON returned by the service or an unknown error code).
227                    #[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
228    variable wildcard pattern and check `.code()`:
229     \
230    &nbsp;&nbsp;&nbsp;`err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
231     \
232    See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-AssumeRoleWithWebIdentityError) for what information is available for the error.")]
233                    Unhandled(crate::error::sealed_unhandled::Unhandled),
234}
235impl AssumeRoleWithWebIdentityError {
236    /// Creates the `AssumeRoleWithWebIdentityError::Unhandled` variant from any error type.
237                    pub fn unhandled(err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>) -> Self {
238                        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source: err.into(), meta: ::std::default::Default::default() })
239                    }
240    
241                    /// Creates the `AssumeRoleWithWebIdentityError::Unhandled` variant from an [`ErrorMetadata`](::aws_smithy_types::error::ErrorMetadata).
242                    pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
243                        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source: err.clone().into(), meta: err })
244                    }
245    /// 
246    /// Returns error metadata, which includes the error code, message,
247    /// request ID, and potentially additional information.
248    /// 
249    pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
250        match self {
251            Self::ExpiredTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
252            Self::IdpCommunicationErrorException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
253            Self::IdpRejectedClaimException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
254            Self::InvalidIdentityTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
255            Self::MalformedPolicyDocumentException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
256            Self::PackedPolicyTooLargeException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
257            Self::RegionDisabledException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
258            Self::Unhandled(e) => &e.meta,
259        }
260    }
261    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::ExpiredTokenException`.
262    pub fn is_expired_token_exception(&self) -> bool {
263        matches!(self, Self::ExpiredTokenException(_))
264    }
265    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::IdpCommunicationErrorException`.
266    pub fn is_idp_communication_error_exception(&self) -> bool {
267        matches!(self, Self::IdpCommunicationErrorException(_))
268    }
269    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::IdpRejectedClaimException`.
270    pub fn is_idp_rejected_claim_exception(&self) -> bool {
271        matches!(self, Self::IdpRejectedClaimException(_))
272    }
273    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::InvalidIdentityTokenException`.
274    pub fn is_invalid_identity_token_exception(&self) -> bool {
275        matches!(self, Self::InvalidIdentityTokenException(_))
276    }
277    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::MalformedPolicyDocumentException`.
278    pub fn is_malformed_policy_document_exception(&self) -> bool {
279        matches!(self, Self::MalformedPolicyDocumentException(_))
280    }
281    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::PackedPolicyTooLargeException`.
282    pub fn is_packed_policy_too_large_exception(&self) -> bool {
283        matches!(self, Self::PackedPolicyTooLargeException(_))
284    }
285    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::RegionDisabledException`.
286    pub fn is_region_disabled_exception(&self) -> bool {
287        matches!(self, Self::RegionDisabledException(_))
288    }
289}
290impl ::std::error::Error for AssumeRoleWithWebIdentityError {
291    fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
292        match self {
293            Self::ExpiredTokenException(_inner) =>
294            ::std::option::Option::Some(_inner)
295            ,
296            Self::IdpCommunicationErrorException(_inner) =>
297            ::std::option::Option::Some(_inner)
298            ,
299            Self::IdpRejectedClaimException(_inner) =>
300            ::std::option::Option::Some(_inner)
301            ,
302            Self::InvalidIdentityTokenException(_inner) =>
303            ::std::option::Option::Some(_inner)
304            ,
305            Self::MalformedPolicyDocumentException(_inner) =>
306            ::std::option::Option::Some(_inner)
307            ,
308            Self::PackedPolicyTooLargeException(_inner) =>
309            ::std::option::Option::Some(_inner)
310            ,
311            Self::RegionDisabledException(_inner) =>
312            ::std::option::Option::Some(_inner)
313            ,
314            Self::Unhandled(_inner) => {
315                ::std::option::Option::Some(&*_inner.source)
316            }
317        }
318    }
319}
320impl ::std::fmt::Display for AssumeRoleWithWebIdentityError {
321    fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
322        match self {
323            Self::ExpiredTokenException(_inner) =>
324            _inner.fmt(f)
325            ,
326            Self::IdpCommunicationErrorException(_inner) =>
327            _inner.fmt(f)
328            ,
329            Self::IdpRejectedClaimException(_inner) =>
330            _inner.fmt(f)
331            ,
332            Self::InvalidIdentityTokenException(_inner) =>
333            _inner.fmt(f)
334            ,
335            Self::MalformedPolicyDocumentException(_inner) =>
336            _inner.fmt(f)
337            ,
338            Self::PackedPolicyTooLargeException(_inner) =>
339            _inner.fmt(f)
340            ,
341            Self::RegionDisabledException(_inner) =>
342            _inner.fmt(f)
343            ,
344            Self::Unhandled(_inner) => {
345                if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
346                                                        write!(f, "unhandled error ({code})")
347                                                    } else {
348                                                        f.write_str("unhandled error")
349                                                    }
350            }
351        }
352    }
353}
354impl ::aws_smithy_types::retry::ProvideErrorKind for AssumeRoleWithWebIdentityError {
355    fn code(&self) -> ::std::option::Option<&str> {
356        ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
357    }
358    fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
359        match self {
360            Self::IdpCommunicationErrorException(inner) => ::std::option::Option::Some(inner.retryable_error_kind()),
361            _ => ::std::option::Option::None
362        }
363    }
364}
365impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for AssumeRoleWithWebIdentityError {
366    fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
367        match self {
368            Self::ExpiredTokenException(_inner) =>
369            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
370            ,
371            Self::IdpCommunicationErrorException(_inner) =>
372            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
373            ,
374            Self::IdpRejectedClaimException(_inner) =>
375            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
376            ,
377            Self::InvalidIdentityTokenException(_inner) =>
378            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
379            ,
380            Self::MalformedPolicyDocumentException(_inner) =>
381            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
382            ,
383            Self::PackedPolicyTooLargeException(_inner) =>
384            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
385            ,
386            Self::RegionDisabledException(_inner) =>
387            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
388            ,
389            Self::Unhandled(_inner) => {
390                &_inner.meta
391            }
392        }
393    }
394}
395impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for AssumeRoleWithWebIdentityError {
396    fn create_unhandled_error(
397                        source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
398                        meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>
399                    ) -> Self {
400        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source, meta: meta.unwrap_or_default() })
401    }
402}
403impl ::aws_types::request_id::RequestId for crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError {
404                                fn request_id(&self) -> Option<&str> {
405                                    self.meta().request_id()
406                                }
407                            }
408
409pub use crate::operation::assume_role_with_web_identity::_assume_role_with_web_identity_output::AssumeRoleWithWebIdentityOutput;
410
411pub use crate::operation::assume_role_with_web_identity::_assume_role_with_web_identity_input::AssumeRoleWithWebIdentityInput;
412
413mod _assume_role_with_web_identity_input;
414
415mod _assume_role_with_web_identity_output;
416
417/// Builders
418pub mod builders;
419