aws_sdk_codeartifact/protocol_serde/
shape_delete_domain_permissions_policy.rs1#[allow(clippy::unnecessary_wraps)]
3pub fn de_delete_domain_permissions_policy_http_error(
4 _response_status: u16,
5 _response_headers: &::aws_smithy_runtime_api::http::Headers,
6 _response_body: &[u8],
7) -> std::result::Result<
8 crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyOutput,
9 crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError,
10> {
11 #[allow(unused_mut)]
12 let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
13 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?;
14 generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
15 let generic = generic_builder.build();
16 let error_code = match generic.code() {
17 Some(code) => code,
18 None => return Err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled(generic)),
19 };
20
21 let _error_message = generic.message().map(|msg| msg.to_owned());
22 Err(match error_code {
23 "AccessDeniedException" => crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::AccessDeniedException({
24 #[allow(unused_mut)]
25 let mut tmp = {
26 #[allow(unused_mut)]
27 let mut output = crate::types::error::builders::AccessDeniedExceptionBuilder::default();
28 output = crate::protocol_serde::shape_access_denied_exception::de_access_denied_exception_json_err(_response_body, output)
29 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?;
30 let output = output.meta(generic);
31 crate::serde_util::access_denied_exception_correct_errors(output)
32 .build()
33 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?
34 };
35 tmp
36 }),
37 "ConflictException" => crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::ConflictException({
38 #[allow(unused_mut)]
39 let mut tmp = {
40 #[allow(unused_mut)]
41 let mut output = crate::types::error::builders::ConflictExceptionBuilder::default();
42 output = crate::protocol_serde::shape_conflict_exception::de_conflict_exception_json_err(_response_body, output)
43 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?;
44 let output = output.meta(generic);
45 crate::serde_util::conflict_exception_correct_errors(output)
46 .build()
47 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?
48 };
49 tmp
50 }),
51 "InternalServerException" => {
52 crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::InternalServerException({
53 #[allow(unused_mut)]
54 let mut tmp = {
55 #[allow(unused_mut)]
56 let mut output = crate::types::error::builders::InternalServerExceptionBuilder::default();
57 output = crate::protocol_serde::shape_internal_server_exception::de_internal_server_exception_json_err(_response_body, output)
58 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?;
59 let output = output.meta(generic);
60 crate::serde_util::internal_server_exception_correct_errors(output)
61 .build()
62 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?
63 };
64 tmp
65 })
66 }
67 "ResourceNotFoundException" => {
68 crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::ResourceNotFoundException({
69 #[allow(unused_mut)]
70 let mut tmp = {
71 #[allow(unused_mut)]
72 let mut output = crate::types::error::builders::ResourceNotFoundExceptionBuilder::default();
73 output =
74 crate::protocol_serde::shape_resource_not_found_exception::de_resource_not_found_exception_json_err(_response_body, output)
75 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?;
76 let output = output.meta(generic);
77 crate::serde_util::resource_not_found_exception_correct_errors(output)
78 .build()
79 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?
80 };
81 tmp
82 })
83 }
84 "ThrottlingException" => crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::ThrottlingException({
85 #[allow(unused_mut)]
86 let mut tmp = {
87 #[allow(unused_mut)]
88 let mut output = crate::types::error::builders::ThrottlingExceptionBuilder::default();
89 output = crate::protocol_serde::shape_throttling_exception::de_throttling_exception_json_err(_response_body, output)
90 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?;
91 output = output.set_retry_after_seconds(
92 crate::protocol_serde::shape_throttling_exception::de_retry_after_seconds_header(_response_headers).map_err(|_| {
93 crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled(
94 "Failed to parse retryAfterSeconds from header `Retry-After",
95 )
96 })?,
97 );
98 let output = output.meta(generic);
99 crate::serde_util::throttling_exception_correct_errors(output)
100 .build()
101 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?
102 };
103 tmp
104 }),
105 "ValidationException" => crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::ValidationException({
106 #[allow(unused_mut)]
107 let mut tmp = {
108 #[allow(unused_mut)]
109 let mut output = crate::types::error::builders::ValidationExceptionBuilder::default();
110 output = crate::protocol_serde::shape_validation_exception::de_validation_exception_json_err(_response_body, output)
111 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?;
112 let output = output.meta(generic);
113 crate::serde_util::validation_exception_correct_errors(output)
114 .build()
115 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?
116 };
117 tmp
118 }),
119 _ => crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::generic(generic),
120 })
121}
122
123#[allow(clippy::unnecessary_wraps)]
124pub fn de_delete_domain_permissions_policy_http_response(
125 _response_status: u16,
126 _response_headers: &::aws_smithy_runtime_api::http::Headers,
127 _response_body: &[u8],
128) -> std::result::Result<
129 crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyOutput,
130 crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError,
131> {
132 Ok({
133 #[allow(unused_mut)]
134 let mut output = crate::operation::delete_domain_permissions_policy::builders::DeleteDomainPermissionsPolicyOutputBuilder::default();
135 output = crate::protocol_serde::shape_delete_domain_permissions_policy::de_delete_domain_permissions_policy(_response_body, output)
136 .map_err(crate::operation::delete_domain_permissions_policy::DeleteDomainPermissionsPolicyError::unhandled)?;
137 output._set_request_id(::aws_types::request_id::RequestId::request_id(_response_headers).map(str::to_string));
138 output.build()
139 })
140}
141
142pub(crate) fn de_delete_domain_permissions_policy(
143 value: &[u8],
144 mut builder: crate::operation::delete_domain_permissions_policy::builders::DeleteDomainPermissionsPolicyOutputBuilder,
145) -> ::std::result::Result<
146 crate::operation::delete_domain_permissions_policy::builders::DeleteDomainPermissionsPolicyOutputBuilder,
147 ::aws_smithy_json::deserialize::error::DeserializeError,
148> {
149 let mut tokens_owned = ::aws_smithy_json::deserialize::json_token_iter(crate::protocol_serde::or_empty_doc(value)).peekable();
150 let tokens = &mut tokens_owned;
151 ::aws_smithy_json::deserialize::token::expect_start_object(tokens.next())?;
152 loop {
153 match tokens.next().transpose()? {
154 Some(::aws_smithy_json::deserialize::Token::EndObject { .. }) => break,
155 Some(::aws_smithy_json::deserialize::Token::ObjectKey { key, .. }) => match key.to_unescaped()?.as_ref() {
156 "policy" => {
157 builder = builder.set_policy(crate::protocol_serde::shape_resource_policy::de_resource_policy(tokens)?);
158 }
159 _ => ::aws_smithy_json::deserialize::token::skip_value(tokens)?,
160 },
161 other => {
162 return Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(format!(
163 "expected object key or end object, found: {:?}",
164 other
165 )))
166 }
167 }
168 }
169 if tokens.next().is_some() {
170 return Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(
171 "found more JSON tokens after completing parsing",
172 ));
173 }
174 Ok(builder)
175}