aws_sdk_sts/operation/
assume_role_with_web_identity.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2/// Orchestration and serialization glue logic for `AssumeRoleWithWebIdentity`.
3#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
4#[non_exhaustive]
5pub struct AssumeRoleWithWebIdentity;
6impl AssumeRoleWithWebIdentity {
7    /// Creates a new `AssumeRoleWithWebIdentity`
8    pub fn new() -> Self {
9        Self
10    }
11    /// The schema for this operation's input shape.
12                    pub const INPUT_SCHEMA: &'static ::aws_smithy_schema::Schema = crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput::SCHEMA;
13                    /// The schema for this operation's output shape.
14                    pub const OUTPUT_SCHEMA: &'static ::aws_smithy_schema::Schema = crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityOutput::SCHEMA;
15    pub(crate) async fn orchestrate(
16                        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
17                        input: crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput,
18                    ) -> ::std::result::Result<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityOutput, ::aws_smithy_runtime_api::client::result::SdkError<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>> {
19                        let map_err = |err: ::aws_smithy_runtime_api::client::result::SdkError<::aws_smithy_runtime_api::client::interceptors::context::Error, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>| {
20                            err.map_service_error(|err| {
21                                err.downcast::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>().expect("correct error type")
22                            })
23                        };
24                        let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
25                            .await
26                            .map_err(map_err)?;
27                        let output = context.finalize().map_err(map_err)?;
28                        ::std::result::Result::Ok(output.downcast::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityOutput>().expect("correct output type"))
29                    }
30    
31                    pub(crate) async fn orchestrate_with_stop_point(
32                        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
33                        input: crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput,
34                        stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
35                    ) -> ::std::result::Result<::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext, ::aws_smithy_runtime_api::client::result::SdkError<::aws_smithy_runtime_api::client::interceptors::context::Error, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse>> {
36                        let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
37                        use ::tracing::Instrument;
38                        ::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point(
39                            "STS",
40                            "AssumeRoleWithWebIdentity",
41                            input,
42                            runtime_plugins,
43                            stop_point
44                        )
45                        // Create a parent span for the entire operation. Includes a random, internal-only,
46                        // seven-digit ID for the operation orchestration so that it can be correlated in the logs.
47                        .instrument(::tracing::debug_span!(
48                                "STS.AssumeRoleWithWebIdentity",
49                                "rpc.service" = "STS",
50                                "rpc.method" = "AssumeRoleWithWebIdentity",
51                                "sdk_invocation_id" = ::fastrand::u32(1_000_000..10_000_000),
52                                "rpc.system" = "aws-api",
53                            ))
54                        .await
55                    }
56    
57                    pub(crate) fn operation_runtime_plugins(
58                        client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
59                        client_config: &crate::config::Config,
60                        config_override: ::std::option::Option<crate::config::Builder>,
61                    ) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
62                        let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
63                        
64                        if let ::std::option::Option::Some(config_override) = config_override {
65                            for plugin in config_override.runtime_plugins.iter().cloned() {
66                                runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
67                            }
68                            runtime_plugins = runtime_plugins.with_operation_plugin(
69                                crate::config::ConfigOverrideRuntimePlugin::new(config_override, client_config.config.clone(), &client_config.runtime_components)
70                            );
71                        }
72                        runtime_plugins
73                    }
74}
75impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for AssumeRoleWithWebIdentity {
76                fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
77                    let mut cfg = ::aws_smithy_types::config_bag::Layer::new("AssumeRoleWithWebIdentity");
78
79                    cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(AssumeRoleWithWebIdentityRequestSerializer));
80                    cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(AssumeRoleWithWebIdentityResponseDeserializer));
81
82                    cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(
83                        crate::config::auth::Params::builder()
84                            .operation_name("AssumeRoleWithWebIdentity")
85                            .build()
86                            .expect("required fields set")
87                    ));
88
89                    cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::SensitiveOutput);
90cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new(
91                            "AssumeRoleWithWebIdentity",
92                            "STS",
93                        ));
94
95                    ::std::option::Option::Some(cfg.freeze())
96                }
97
98                fn runtime_components(&self, _: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
99                    #[allow(unused_mut)]
100                    let mut rcb = ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("AssumeRoleWithWebIdentity")
101                            .with_interceptor(::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default())
102.with_interceptor(AssumeRoleWithWebIdentityEndpointParamsInterceptor)
103                            .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>::new())
104.with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>::new())
105.with_retry_classifier(::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError>::new());
106
107                    ::std::borrow::Cow::Owned(rcb)
108                }
109            }
110
111            
112#[derive(Debug)]
113            struct AssumeRoleWithWebIdentityResponseDeserializer;
114            impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for AssumeRoleWithWebIdentityResponseDeserializer {
115                
116
117                fn deserialize_nonstreaming_with_config(&self, response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse, _cfg: &::aws_smithy_types::config_bag::ConfigBag) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
118                    let (success, status) = (response.status().is_success(), response.status().as_u16());
119            let headers = response.headers();
120            let body = response.body().bytes().expect("body loaded");
121            #[allow(unused_mut)]
122            let mut force_error = false;
123            ::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
124            let parse_result = if !success && status != 200 || force_error {
125                crate::protocol_serde::shape_assume_role_with_web_identity::de_assume_role_with_web_identity_http_error(status, headers, body)
126            } else {
127                crate::protocol_serde::shape_assume_role_with_web_identity::de_assume_role_with_web_identity_http_response(status, headers, body)
128            };
129            crate::protocol_serde::type_erase_result(parse_result)
130                }
131            }
132#[derive(Debug)]
133            struct AssumeRoleWithWebIdentityRequestSerializer;
134            impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for AssumeRoleWithWebIdentityRequestSerializer {
135                #[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
136                fn serialize_input(&self, input: ::aws_smithy_runtime_api::client::interceptors::context::Input, _cfg: &mut ::aws_smithy_types::config_bag::ConfigBag) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
137                    let input = input.downcast::<crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput>().expect("correct type");
138                    let _header_serialization_settings = _cfg.load::<crate::serialization_settings::HeaderSerializationSettings>().cloned().unwrap_or_default();
139                    let mut request_builder = {
140                        #[allow(clippy::uninlined_format_args)]
141fn uri_base(_input: &crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput, output: &mut ::std::string::String) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
142    use ::std::fmt::Write as _;
143    ::std::write!(output, "/").expect("formatting should succeed");
144    ::std::result::Result::Ok(())
145}
146#[allow(clippy::unnecessary_wraps)]
147fn update_http_builder(
148                input: &crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityInput,
149                builder: ::http_1x::request::Builder
150            ) -> ::std::result::Result<::http_1x::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
151    let mut uri = ::std::string::String::new();
152    uri_base(input, &mut uri)?;
153    ::std::result::Result::Ok(builder.method("POST").uri(uri))
154}
155let mut builder = update_http_builder(&input, ::http_1x::request::Builder::new())?;
156builder = _header_serialization_settings.set_default_header(builder, ::http_1x::header::CONTENT_TYPE, "application/x-www-form-urlencoded");
157builder
158                    };
159                    let body = ::aws_smithy_types::body::SdkBody::from(crate::protocol_serde::shape_assume_role_with_web_identity_input::ser_assume_role_with_web_identity_input_input_input(&input)?);
160                    if let Some(content_length) = body.content_length() {
161                                let content_length = content_length.to_string();
162                                request_builder = _header_serialization_settings.set_default_header(request_builder, ::http_1x::header::CONTENT_LENGTH, &content_length);
163                            }
164                    ::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
165                }
166            }
167#[derive(Debug)]
168            struct AssumeRoleWithWebIdentityEndpointParamsInterceptor;
169
170            impl ::aws_smithy_runtime_api::client::interceptors::Intercept for AssumeRoleWithWebIdentityEndpointParamsInterceptor {
171                fn name(&self) -> &'static str {
172                    "AssumeRoleWithWebIdentityEndpointParamsInterceptor"
173                }
174
175                fn read_before_execution(
176                    &self,
177                    context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<'_, ::aws_smithy_runtime_api::client::interceptors::context::Input, ::aws_smithy_runtime_api::client::interceptors::context::Output, ::aws_smithy_runtime_api::client::interceptors::context::Error>,
178                    cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
179                ) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
180                    let _input = context.input()
181                        .downcast_ref::<AssumeRoleWithWebIdentityInput>()
182                        .ok_or("failed to downcast to AssumeRoleWithWebIdentityInput")?;
183
184                    
185
186                    let params = crate::config::endpoint::Params::builder()
187                        .set_region(cfg.load::<::aws_types::region::Region>().map(|r|r.as_ref().to_owned()))
188.set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
189.set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
190.set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
191                        .build()
192                        .map_err(|err| ::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err))?;
193                    cfg.interceptor_state().store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
194                    ::std::result::Result::Ok(())
195                }
196            }
197
198            // The get_* functions below are generated from JMESPath expressions in the
199            // operationContextParams trait. They target the operation's input shape.
200
201            
202
203/// Error type for the `AssumeRoleWithWebIdentityError` operation.
204#[non_exhaustive]
205#[derive(::std::fmt::Debug)]
206pub enum AssumeRoleWithWebIdentityError {
207    /// <p>The web identity token that was passed is expired or is not valid. Get a new identity token from the identity provider and then retry the request.</p>
208    ExpiredTokenException(crate::types::error::ExpiredTokenException),
209    /// <p>The request could not be fulfilled because the identity provider (IDP) that was asked to verify the incoming identity token could not be reached. This is often a transient error caused by network conditions. Retry the request a limited number of times so that you don't exceed the request rate. If the error persists, the identity provider might be down or not responding.</p>
210    IdpCommunicationErrorException(crate::types::error::IdpCommunicationErrorException),
211    /// <p>The identity provider (IdP) reported that authentication failed. This might be because the claim is invalid.</p>
212    /// <p>If this error is returned for the <code>AssumeRoleWithWebIdentity</code> operation, it can also mean that the claim has expired or has been explicitly revoked.</p>
213    IdpRejectedClaimException(crate::types::error::IdpRejectedClaimException),
214    /// <p>The web identity token that was passed could not be validated by Amazon Web Services. Get a new identity token from the identity provider and then retry the request.</p>
215    InvalidIdentityTokenException(crate::types::error::InvalidIdentityTokenException),
216    /// <p>The request was rejected because the policy document was malformed. The error message describes the specific error.</p>
217    MalformedPolicyDocumentException(crate::types::error::MalformedPolicyDocumentException),
218    /// <p>The request was rejected because the total packed size of the session policies and session tags combined was too large. An Amazon Web Services conversion compresses the session policy document, session policy ARNs, and session tags into a packed binary format that has a separate limit. The error message indicates by percentage how close the policies and tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the <i>IAM User Guide</i>.</p>
219    /// <p>You could receive this error even though you meet other defined session policy and session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User Guide</i>.</p>
220    PackedPolicyTooLargeException(crate::types::error::PackedPolicyTooLargeException),
221    /// <p>STS is not activated in the requested region for the account that is being asked to generate credentials. The account administrator must use the IAM console to activate STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User Guide</i>.</p>
222    RegionDisabledException(crate::types::error::RegionDisabledException),
223    /// An unexpected error occurred (e.g., invalid JSON returned by the service or an unknown error code).
224                    #[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
225    variable wildcard pattern and check `.code()`:
226     \
227    &nbsp;&nbsp;&nbsp;`err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
228     \
229    See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-AssumeRoleWithWebIdentityError) for what information is available for the error.")]
230                    Unhandled(crate::error::sealed_unhandled::Unhandled),
231}
232impl AssumeRoleWithWebIdentityError {
233    /// Creates the `AssumeRoleWithWebIdentityError::Unhandled` variant from any error type.
234                    pub fn unhandled(err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>) -> Self {
235                        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source: err.into(), meta: ::std::default::Default::default() })
236                    }
237    
238                    /// Creates the `AssumeRoleWithWebIdentityError::Unhandled` variant from an [`ErrorMetadata`](::aws_smithy_types::error::ErrorMetadata).
239                    pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
240                        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source: err.clone().into(), meta: err })
241                    }
242    /// 
243    /// Returns error metadata, which includes the error code, message,
244    /// request ID, and potentially additional information.
245    /// 
246    pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
247        match self {
248            Self::ExpiredTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
249            Self::IdpCommunicationErrorException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
250            Self::IdpRejectedClaimException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
251            Self::InvalidIdentityTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
252            Self::MalformedPolicyDocumentException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
253            Self::PackedPolicyTooLargeException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
254            Self::RegionDisabledException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
255            Self::Unhandled(e) => &e.meta,
256        }
257    }
258    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::ExpiredTokenException`.
259    pub fn is_expired_token_exception(&self) -> bool {
260        matches!(self, Self::ExpiredTokenException(_))
261    }
262    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::IdpCommunicationErrorException`.
263    pub fn is_idp_communication_error_exception(&self) -> bool {
264        matches!(self, Self::IdpCommunicationErrorException(_))
265    }
266    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::IdpRejectedClaimException`.
267    pub fn is_idp_rejected_claim_exception(&self) -> bool {
268        matches!(self, Self::IdpRejectedClaimException(_))
269    }
270    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::InvalidIdentityTokenException`.
271    pub fn is_invalid_identity_token_exception(&self) -> bool {
272        matches!(self, Self::InvalidIdentityTokenException(_))
273    }
274    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::MalformedPolicyDocumentException`.
275    pub fn is_malformed_policy_document_exception(&self) -> bool {
276        matches!(self, Self::MalformedPolicyDocumentException(_))
277    }
278    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::PackedPolicyTooLargeException`.
279    pub fn is_packed_policy_too_large_exception(&self) -> bool {
280        matches!(self, Self::PackedPolicyTooLargeException(_))
281    }
282    /// Returns `true` if the error kind is `AssumeRoleWithWebIdentityError::RegionDisabledException`.
283    pub fn is_region_disabled_exception(&self) -> bool {
284        matches!(self, Self::RegionDisabledException(_))
285    }
286}
287impl ::std::error::Error for AssumeRoleWithWebIdentityError {
288    fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
289        match self {
290            Self::ExpiredTokenException(_inner) =>
291            ::std::option::Option::Some(_inner)
292            ,
293            Self::IdpCommunicationErrorException(_inner) =>
294            ::std::option::Option::Some(_inner)
295            ,
296            Self::IdpRejectedClaimException(_inner) =>
297            ::std::option::Option::Some(_inner)
298            ,
299            Self::InvalidIdentityTokenException(_inner) =>
300            ::std::option::Option::Some(_inner)
301            ,
302            Self::MalformedPolicyDocumentException(_inner) =>
303            ::std::option::Option::Some(_inner)
304            ,
305            Self::PackedPolicyTooLargeException(_inner) =>
306            ::std::option::Option::Some(_inner)
307            ,
308            Self::RegionDisabledException(_inner) =>
309            ::std::option::Option::Some(_inner)
310            ,
311            Self::Unhandled(_inner) => {
312                ::std::option::Option::Some(&*_inner.source)
313            }
314        }
315    }
316}
317impl ::std::fmt::Display for AssumeRoleWithWebIdentityError {
318    fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
319        match self {
320            Self::ExpiredTokenException(_inner) =>
321            _inner.fmt(f)
322            ,
323            Self::IdpCommunicationErrorException(_inner) =>
324            _inner.fmt(f)
325            ,
326            Self::IdpRejectedClaimException(_inner) =>
327            _inner.fmt(f)
328            ,
329            Self::InvalidIdentityTokenException(_inner) =>
330            _inner.fmt(f)
331            ,
332            Self::MalformedPolicyDocumentException(_inner) =>
333            _inner.fmt(f)
334            ,
335            Self::PackedPolicyTooLargeException(_inner) =>
336            _inner.fmt(f)
337            ,
338            Self::RegionDisabledException(_inner) =>
339            _inner.fmt(f)
340            ,
341            Self::Unhandled(_inner) => {
342                if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
343                                                        write!(f, "unhandled error ({code})")
344                                                    } else {
345                                                        f.write_str("unhandled error")
346                                                    }
347            }
348        }
349    }
350}
351impl ::aws_smithy_types::retry::ProvideErrorKind for AssumeRoleWithWebIdentityError {
352    fn code(&self) -> ::std::option::Option<&str> {
353        ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
354    }
355    fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
356        match self {
357            Self::IdpCommunicationErrorException(inner) => ::std::option::Option::Some(inner.retryable_error_kind()),
358            _ => ::std::option::Option::None
359        }
360    }
361}
362impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for AssumeRoleWithWebIdentityError {
363    fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
364        match self {
365            Self::ExpiredTokenException(_inner) =>
366            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
367            ,
368            Self::IdpCommunicationErrorException(_inner) =>
369            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
370            ,
371            Self::IdpRejectedClaimException(_inner) =>
372            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
373            ,
374            Self::InvalidIdentityTokenException(_inner) =>
375            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
376            ,
377            Self::MalformedPolicyDocumentException(_inner) =>
378            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
379            ,
380            Self::PackedPolicyTooLargeException(_inner) =>
381            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
382            ,
383            Self::RegionDisabledException(_inner) =>
384            ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner)
385            ,
386            Self::Unhandled(_inner) => {
387                &_inner.meta
388            }
389        }
390    }
391}
392impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for AssumeRoleWithWebIdentityError {
393    fn create_unhandled_error(
394                        source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
395                        meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>
396                    ) -> Self {
397        Self::Unhandled(crate::error::sealed_unhandled::Unhandled { source, meta: meta.unwrap_or_default() })
398    }
399}
400impl ::aws_types::request_id::RequestId for crate::operation::assume_role_with_web_identity::AssumeRoleWithWebIdentityError {
401                                fn request_id(&self) -> Option<&str> {
402                                    self.meta().request_id()
403                                }
404                            }
405
406pub use crate::operation::assume_role_with_web_identity::_assume_role_with_web_identity_input::AssumeRoleWithWebIdentityInput;
407
408pub use crate::operation::assume_role_with_web_identity::_assume_role_with_web_identity_output::AssumeRoleWithWebIdentityOutput;
409
410mod _assume_role_with_web_identity_input;
411
412mod _assume_role_with_web_identity_output;
413
414/// Builders
415pub mod builders;
416