aws_sdk_codeartifact/protocol_serde/
shape_get_domain_permissions_policy.rs1#[allow(clippy::unnecessary_wraps)]
3pub fn de_get_domain_permissions_policy_http_error(
4 _response_status: u16,
5 _response_headers: &::aws_smithy_runtime_api::http::Headers,
6 _response_body: &[u8],
7) -> std::result::Result<
8 crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyOutput,
9 crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError,
10> {
11 #[allow(unused_mut)]
12 let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
13 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?;
14 generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
15 let generic = generic_builder.build();
16 let error_code = match generic.code() {
17 Some(code) => code,
18 None => return Err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled(generic)),
19 };
20
21 let _error_message = generic.message().map(|msg| msg.to_owned());
22 Err(match error_code {
23 "AccessDeniedException" => crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::AccessDeniedException({
24 #[allow(unused_mut)]
25 let mut tmp = {
26 #[allow(unused_mut)]
27 let mut output = crate::types::error::builders::AccessDeniedExceptionBuilder::default();
28 output = crate::protocol_serde::shape_access_denied_exception::de_access_denied_exception_json_err(_response_body, output)
29 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?;
30 let output = output.meta(generic);
31 crate::serde_util::access_denied_exception_correct_errors(output)
32 .build()
33 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?
34 };
35 tmp
36 }),
37 "InternalServerException" => crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::InternalServerException({
38 #[allow(unused_mut)]
39 let mut tmp = {
40 #[allow(unused_mut)]
41 let mut output = crate::types::error::builders::InternalServerExceptionBuilder::default();
42 output = crate::protocol_serde::shape_internal_server_exception::de_internal_server_exception_json_err(_response_body, output)
43 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?;
44 let output = output.meta(generic);
45 crate::serde_util::internal_server_exception_correct_errors(output)
46 .build()
47 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?
48 };
49 tmp
50 }),
51 "ResourceNotFoundException" => crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::ResourceNotFoundException({
52 #[allow(unused_mut)]
53 let mut tmp = {
54 #[allow(unused_mut)]
55 let mut output = crate::types::error::builders::ResourceNotFoundExceptionBuilder::default();
56 output = crate::protocol_serde::shape_resource_not_found_exception::de_resource_not_found_exception_json_err(_response_body, output)
57 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?;
58 let output = output.meta(generic);
59 crate::serde_util::resource_not_found_exception_correct_errors(output)
60 .build()
61 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?
62 };
63 tmp
64 }),
65 "ThrottlingException" => crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::ThrottlingException({
66 #[allow(unused_mut)]
67 let mut tmp = {
68 #[allow(unused_mut)]
69 let mut output = crate::types::error::builders::ThrottlingExceptionBuilder::default();
70 output = crate::protocol_serde::shape_throttling_exception::de_throttling_exception_json_err(_response_body, output)
71 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?;
72 output = output.set_retry_after_seconds(
73 crate::protocol_serde::shape_throttling_exception::de_retry_after_seconds_header(_response_headers).map_err(|_| {
74 crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled(
75 "Failed to parse retryAfterSeconds from header `Retry-After",
76 )
77 })?,
78 );
79 let output = output.meta(generic);
80 crate::serde_util::throttling_exception_correct_errors(output)
81 .build()
82 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?
83 };
84 tmp
85 }),
86 "ValidationException" => crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::ValidationException({
87 #[allow(unused_mut)]
88 let mut tmp = {
89 #[allow(unused_mut)]
90 let mut output = crate::types::error::builders::ValidationExceptionBuilder::default();
91 output = crate::protocol_serde::shape_validation_exception::de_validation_exception_json_err(_response_body, output)
92 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?;
93 let output = output.meta(generic);
94 crate::serde_util::validation_exception_correct_errors(output)
95 .build()
96 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?
97 };
98 tmp
99 }),
100 _ => crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::generic(generic),
101 })
102}
103
104#[allow(clippy::unnecessary_wraps)]
105pub fn de_get_domain_permissions_policy_http_response(
106 _response_status: u16,
107 _response_headers: &::aws_smithy_runtime_api::http::Headers,
108 _response_body: &[u8],
109) -> std::result::Result<
110 crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyOutput,
111 crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError,
112> {
113 Ok({
114 #[allow(unused_mut)]
115 let mut output = crate::operation::get_domain_permissions_policy::builders::GetDomainPermissionsPolicyOutputBuilder::default();
116 output = crate::protocol_serde::shape_get_domain_permissions_policy::de_get_domain_permissions_policy(_response_body, output)
117 .map_err(crate::operation::get_domain_permissions_policy::GetDomainPermissionsPolicyError::unhandled)?;
118 output._set_request_id(::aws_types::request_id::RequestId::request_id(_response_headers).map(str::to_string));
119 output.build()
120 })
121}
122
123pub(crate) fn de_get_domain_permissions_policy(
124 value: &[u8],
125 mut builder: crate::operation::get_domain_permissions_policy::builders::GetDomainPermissionsPolicyOutputBuilder,
126) -> ::std::result::Result<
127 crate::operation::get_domain_permissions_policy::builders::GetDomainPermissionsPolicyOutputBuilder,
128 ::aws_smithy_json::deserialize::error::DeserializeError,
129> {
130 let mut tokens_owned = ::aws_smithy_json::deserialize::json_token_iter(crate::protocol_serde::or_empty_doc(value)).peekable();
131 let tokens = &mut tokens_owned;
132 ::aws_smithy_json::deserialize::token::expect_start_object(tokens.next())?;
133 loop {
134 match tokens.next().transpose()? {
135 Some(::aws_smithy_json::deserialize::Token::EndObject { .. }) => break,
136 Some(::aws_smithy_json::deserialize::Token::ObjectKey { key, .. }) => match key.to_unescaped()?.as_ref() {
137 "policy" => {
138 builder = builder.set_policy(crate::protocol_serde::shape_resource_policy::de_resource_policy(tokens)?);
139 }
140 _ => ::aws_smithy_json::deserialize::token::skip_value(tokens)?,
141 },
142 other => {
143 return Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(format!(
144 "expected object key or end object, found: {:?}",
145 other
146 )))
147 }
148 }
149 }
150 if tokens.next().is_some() {
151 return Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(
152 "found more JSON tokens after completing parsing",
153 ));
154 }
155 Ok(builder)
156}