1#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
4#[non_exhaustive]
5pub struct AdminRespondToAuthChallenge;
6impl AdminRespondToAuthChallenge {
7 pub fn new() -> Self {
9 Self
10 }
11 pub(crate) async fn orchestrate(
12 runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
13 input: crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeInput,
14 ) -> ::std::result::Result<
15 crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeOutput,
16 ::aws_smithy_runtime_api::client::result::SdkError<
17 crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeError,
18 ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
19 >,
20 > {
21 let map_err = |err: ::aws_smithy_runtime_api::client::result::SdkError<
22 ::aws_smithy_runtime_api::client::interceptors::context::Error,
23 ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
24 >| {
25 err.map_service_error(|err| {
26 err.downcast::<crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeError>()
27 .expect("correct error type")
28 })
29 };
30 let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
31 .await
32 .map_err(map_err)?;
33 let output = context.finalize().map_err(map_err)?;
34 ::std::result::Result::Ok(
35 output
36 .downcast::<crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeOutput>()
37 .expect("correct output type"),
38 )
39 }
40
41 pub(crate) async fn orchestrate_with_stop_point(
42 runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
43 input: crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeInput,
44 stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
45 ) -> ::std::result::Result<
46 ::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext,
47 ::aws_smithy_runtime_api::client::result::SdkError<
48 ::aws_smithy_runtime_api::client::interceptors::context::Error,
49 ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
50 >,
51 > {
52 let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
53 use ::tracing::Instrument;
54 ::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point(
55 "Cognito Identity Provider",
56 "AdminRespondToAuthChallenge",
57 input,
58 runtime_plugins,
59 stop_point,
60 )
61 .instrument(::tracing::debug_span!(
64 "Cognito Identity Provider.AdminRespondToAuthChallenge",
65 "rpc.service" = "Cognito Identity Provider",
66 "rpc.method" = "AdminRespondToAuthChallenge",
67 "sdk_invocation_id" = ::fastrand::u32(1_000_000..10_000_000),
68 "rpc.system" = "aws-api",
69 ))
70 .await
71 }
72
73 pub(crate) fn operation_runtime_plugins(
74 client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
75 client_config: &crate::config::Config,
76 config_override: ::std::option::Option<crate::config::Builder>,
77 ) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
78 let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
79
80 if let ::std::option::Option::Some(config_override) = config_override {
81 for plugin in config_override.runtime_plugins.iter().cloned() {
82 runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
83 }
84 runtime_plugins = runtime_plugins.with_operation_plugin(crate::config::ConfigOverrideRuntimePlugin::new(
85 config_override,
86 client_config.config.clone(),
87 &client_config.runtime_components,
88 ));
89 }
90 runtime_plugins
91 }
92}
93impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for AdminRespondToAuthChallenge {
94 fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
95 let mut cfg = ::aws_smithy_types::config_bag::Layer::new("AdminRespondToAuthChallenge");
96
97 cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(
98 AdminRespondToAuthChallengeRequestSerializer,
99 ));
100 cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(
101 AdminRespondToAuthChallengeResponseDeserializer,
102 ));
103
104 cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(
105 crate::config::auth::Params::builder()
106 .operation_name("AdminRespondToAuthChallenge")
107 .build()
108 .expect("required fields set"),
109 ));
110
111 cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::SensitiveOutput);
112 cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new(
113 "AdminRespondToAuthChallenge",
114 "Cognito Identity Provider",
115 ));
116 let mut signing_options = ::aws_runtime::auth::SigningOptions::default();
117 signing_options.double_uri_encode = true;
118 signing_options.content_sha256_header = false;
119 signing_options.normalize_uri_path = true;
120 signing_options.payload_override = None;
121
122 cfg.store_put(::aws_runtime::auth::SigV4OperationSigningConfig {
123 signing_options,
124 ..::std::default::Default::default()
125 });
126
127 ::std::option::Option::Some(cfg.freeze())
128 }
129
130 fn runtime_components(
131 &self,
132 _: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder,
133 ) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
134 #[allow(unused_mut)]
135 let mut rcb = ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("AdminRespondToAuthChallenge")
136 .with_interceptor(::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default())
137 .with_interceptor(AdminRespondToAuthChallengeEndpointParamsInterceptor)
138 .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<
139 crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeError,
140 >::new())
141 .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<
142 crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeError,
143 >::new())
144 .with_retry_classifier(::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<
145 crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeError,
146 >::new());
147
148 ::std::borrow::Cow::Owned(rcb)
149 }
150}
151
152#[derive(Debug)]
153struct AdminRespondToAuthChallengeResponseDeserializer;
154impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for AdminRespondToAuthChallengeResponseDeserializer {
155 fn deserialize_nonstreaming(
156 &self,
157 response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
158 ) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
159 let (success, status) = (response.status().is_success(), response.status().as_u16());
160 let headers = response.headers();
161 let body = response.body().bytes().expect("body loaded");
162 #[allow(unused_mut)]
163 let mut force_error = false;
164 ::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
165 let parse_result = if !success && status != 200 || force_error {
166 crate::protocol_serde::shape_admin_respond_to_auth_challenge::de_admin_respond_to_auth_challenge_http_error(status, headers, body)
167 } else {
168 crate::protocol_serde::shape_admin_respond_to_auth_challenge::de_admin_respond_to_auth_challenge_http_response(status, headers, body)
169 };
170 crate::protocol_serde::type_erase_result(parse_result)
171 }
172}
173#[derive(Debug)]
174struct AdminRespondToAuthChallengeRequestSerializer;
175impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for AdminRespondToAuthChallengeRequestSerializer {
176 #[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
177 fn serialize_input(
178 &self,
179 input: ::aws_smithy_runtime_api::client::interceptors::context::Input,
180 _cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
181 ) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
182 let input = input
183 .downcast::<crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeInput>()
184 .expect("correct type");
185 let _header_serialization_settings = _cfg
186 .load::<crate::serialization_settings::HeaderSerializationSettings>()
187 .cloned()
188 .unwrap_or_default();
189 let mut request_builder = {
190 #[allow(clippy::uninlined_format_args)]
191 fn uri_base(
192 _input: &crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeInput,
193 output: &mut ::std::string::String,
194 ) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
195 use ::std::fmt::Write as _;
196 ::std::write!(output, "/").expect("formatting should succeed");
197 ::std::result::Result::Ok(())
198 }
199 #[allow(clippy::unnecessary_wraps)]
200 fn update_http_builder(
201 input: &crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeInput,
202 builder: ::http::request::Builder,
203 ) -> ::std::result::Result<::http::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
204 let mut uri = ::std::string::String::new();
205 uri_base(input, &mut uri)?;
206 ::std::result::Result::Ok(builder.method("POST").uri(uri))
207 }
208 let mut builder = update_http_builder(&input, ::http::request::Builder::new())?;
209 builder = _header_serialization_settings.set_default_header(builder, ::http::header::CONTENT_TYPE, "application/x-amz-json-1.1");
210 builder = _header_serialization_settings.set_default_header(
211 builder,
212 ::http::header::HeaderName::from_static("x-amz-target"),
213 "AWSCognitoIdentityProviderService.AdminRespondToAuthChallenge",
214 );
215 builder
216 };
217 let body = ::aws_smithy_types::body::SdkBody::from(
218 crate::protocol_serde::shape_admin_respond_to_auth_challenge::ser_admin_respond_to_auth_challenge_input(&input)?,
219 );
220 if let Some(content_length) = body.content_length() {
221 let content_length = content_length.to_string();
222 request_builder = _header_serialization_settings.set_default_header(request_builder, ::http::header::CONTENT_LENGTH, &content_length);
223 }
224 ::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
225 }
226}
227#[derive(Debug)]
228struct AdminRespondToAuthChallengeEndpointParamsInterceptor;
229
230impl ::aws_smithy_runtime_api::client::interceptors::Intercept for AdminRespondToAuthChallengeEndpointParamsInterceptor {
231 fn name(&self) -> &'static str {
232 "AdminRespondToAuthChallengeEndpointParamsInterceptor"
233 }
234
235 fn read_before_execution(
236 &self,
237 context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<
238 '_,
239 ::aws_smithy_runtime_api::client::interceptors::context::Input,
240 ::aws_smithy_runtime_api::client::interceptors::context::Output,
241 ::aws_smithy_runtime_api::client::interceptors::context::Error,
242 >,
243 cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
244 ) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
245 let _input = context
246 .input()
247 .downcast_ref::<AdminRespondToAuthChallengeInput>()
248 .ok_or("failed to downcast to AdminRespondToAuthChallengeInput")?;
249
250 let params = crate::config::endpoint::Params::builder()
251 .set_region(cfg.load::<::aws_types::region::Region>().map(|r| r.as_ref().to_owned()))
252 .set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
253 .set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
254 .set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
255 .build()
256 .map_err(|err| {
257 ::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err)
258 })?;
259 cfg.interceptor_state()
260 .store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
261 ::std::result::Result::Ok(())
262 }
263}
264
265#[non_exhaustive]
270#[derive(::std::fmt::Debug)]
271pub enum AdminRespondToAuthChallengeError {
272 AliasExistsException(crate::types::error::AliasExistsException),
274 CodeMismatchException(crate::types::error::CodeMismatchException),
276 ExpiredCodeException(crate::types::error::ExpiredCodeException),
278 InternalErrorException(crate::types::error::InternalErrorException),
280 InvalidEmailRoleAccessPolicyException(crate::types::error::InvalidEmailRoleAccessPolicyException),
282 InvalidLambdaResponseException(crate::types::error::InvalidLambdaResponseException),
284 InvalidParameterException(crate::types::error::InvalidParameterException),
286 InvalidPasswordException(crate::types::error::InvalidPasswordException),
288 InvalidSmsRoleAccessPolicyException(crate::types::error::InvalidSmsRoleAccessPolicyException),
290 InvalidSmsRoleTrustRelationshipException(crate::types::error::InvalidSmsRoleTrustRelationshipException),
292 InvalidUserPoolConfigurationException(crate::types::error::InvalidUserPoolConfigurationException),
294 MfaMethodNotFoundException(crate::types::error::MfaMethodNotFoundException),
296 NotAuthorizedException(crate::types::error::NotAuthorizedException),
298 PasswordHistoryPolicyViolationException(crate::types::error::PasswordHistoryPolicyViolationException),
300 PasswordResetRequiredException(crate::types::error::PasswordResetRequiredException),
302 ResourceNotFoundException(crate::types::error::ResourceNotFoundException),
304 SoftwareTokenMfaNotFoundException(crate::types::error::SoftwareTokenMfaNotFoundException),
306 TooManyRequestsException(crate::types::error::TooManyRequestsException),
308 UnexpectedLambdaException(crate::types::error::UnexpectedLambdaException),
310 UserLambdaValidationException(crate::types::error::UserLambdaValidationException),
312 UserNotConfirmedException(crate::types::error::UserNotConfirmedException),
314 UserNotFoundException(crate::types::error::UserNotFoundException),
316 #[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
318 variable wildcard pattern and check `.code()`:
319 \
320 `err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
321 \
322 See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-AdminRespondToAuthChallengeError) for what information is available for the error.")]
323 Unhandled(crate::error::sealed_unhandled::Unhandled),
324}
325impl AdminRespondToAuthChallengeError {
326 pub fn unhandled(
328 err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>,
329 ) -> Self {
330 Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
331 source: err.into(),
332 meta: ::std::default::Default::default(),
333 })
334 }
335
336 pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
338 Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
339 source: err.clone().into(),
340 meta: err,
341 })
342 }
343 pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
348 match self {
349 Self::AliasExistsException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
350 Self::CodeMismatchException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
351 Self::ExpiredCodeException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
352 Self::InternalErrorException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
353 Self::InvalidEmailRoleAccessPolicyException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
354 Self::InvalidLambdaResponseException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
355 Self::InvalidParameterException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
356 Self::InvalidPasswordException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
357 Self::InvalidSmsRoleAccessPolicyException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
358 Self::InvalidSmsRoleTrustRelationshipException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
359 Self::InvalidUserPoolConfigurationException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
360 Self::MfaMethodNotFoundException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
361 Self::NotAuthorizedException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
362 Self::PasswordHistoryPolicyViolationException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
363 Self::PasswordResetRequiredException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
364 Self::ResourceNotFoundException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
365 Self::SoftwareTokenMfaNotFoundException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
366 Self::TooManyRequestsException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
367 Self::UnexpectedLambdaException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
368 Self::UserLambdaValidationException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
369 Self::UserNotConfirmedException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
370 Self::UserNotFoundException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
371 Self::Unhandled(e) => &e.meta,
372 }
373 }
374 pub fn is_alias_exists_exception(&self) -> bool {
376 matches!(self, Self::AliasExistsException(_))
377 }
378 pub fn is_code_mismatch_exception(&self) -> bool {
380 matches!(self, Self::CodeMismatchException(_))
381 }
382 pub fn is_expired_code_exception(&self) -> bool {
384 matches!(self, Self::ExpiredCodeException(_))
385 }
386 pub fn is_internal_error_exception(&self) -> bool {
388 matches!(self, Self::InternalErrorException(_))
389 }
390 pub fn is_invalid_email_role_access_policy_exception(&self) -> bool {
392 matches!(self, Self::InvalidEmailRoleAccessPolicyException(_))
393 }
394 pub fn is_invalid_lambda_response_exception(&self) -> bool {
396 matches!(self, Self::InvalidLambdaResponseException(_))
397 }
398 pub fn is_invalid_parameter_exception(&self) -> bool {
400 matches!(self, Self::InvalidParameterException(_))
401 }
402 pub fn is_invalid_password_exception(&self) -> bool {
404 matches!(self, Self::InvalidPasswordException(_))
405 }
406 pub fn is_invalid_sms_role_access_policy_exception(&self) -> bool {
408 matches!(self, Self::InvalidSmsRoleAccessPolicyException(_))
409 }
410 pub fn is_invalid_sms_role_trust_relationship_exception(&self) -> bool {
412 matches!(self, Self::InvalidSmsRoleTrustRelationshipException(_))
413 }
414 pub fn is_invalid_user_pool_configuration_exception(&self) -> bool {
416 matches!(self, Self::InvalidUserPoolConfigurationException(_))
417 }
418 pub fn is_mfa_method_not_found_exception(&self) -> bool {
420 matches!(self, Self::MfaMethodNotFoundException(_))
421 }
422 pub fn is_not_authorized_exception(&self) -> bool {
424 matches!(self, Self::NotAuthorizedException(_))
425 }
426 pub fn is_password_history_policy_violation_exception(&self) -> bool {
428 matches!(self, Self::PasswordHistoryPolicyViolationException(_))
429 }
430 pub fn is_password_reset_required_exception(&self) -> bool {
432 matches!(self, Self::PasswordResetRequiredException(_))
433 }
434 pub fn is_resource_not_found_exception(&self) -> bool {
436 matches!(self, Self::ResourceNotFoundException(_))
437 }
438 pub fn is_software_token_mfa_not_found_exception(&self) -> bool {
440 matches!(self, Self::SoftwareTokenMfaNotFoundException(_))
441 }
442 pub fn is_too_many_requests_exception(&self) -> bool {
444 matches!(self, Self::TooManyRequestsException(_))
445 }
446 pub fn is_unexpected_lambda_exception(&self) -> bool {
448 matches!(self, Self::UnexpectedLambdaException(_))
449 }
450 pub fn is_user_lambda_validation_exception(&self) -> bool {
452 matches!(self, Self::UserLambdaValidationException(_))
453 }
454 pub fn is_user_not_confirmed_exception(&self) -> bool {
456 matches!(self, Self::UserNotConfirmedException(_))
457 }
458 pub fn is_user_not_found_exception(&self) -> bool {
460 matches!(self, Self::UserNotFoundException(_))
461 }
462}
463impl ::std::error::Error for AdminRespondToAuthChallengeError {
464 fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
465 match self {
466 Self::AliasExistsException(_inner) => ::std::option::Option::Some(_inner),
467 Self::CodeMismatchException(_inner) => ::std::option::Option::Some(_inner),
468 Self::ExpiredCodeException(_inner) => ::std::option::Option::Some(_inner),
469 Self::InternalErrorException(_inner) => ::std::option::Option::Some(_inner),
470 Self::InvalidEmailRoleAccessPolicyException(_inner) => ::std::option::Option::Some(_inner),
471 Self::InvalidLambdaResponseException(_inner) => ::std::option::Option::Some(_inner),
472 Self::InvalidParameterException(_inner) => ::std::option::Option::Some(_inner),
473 Self::InvalidPasswordException(_inner) => ::std::option::Option::Some(_inner),
474 Self::InvalidSmsRoleAccessPolicyException(_inner) => ::std::option::Option::Some(_inner),
475 Self::InvalidSmsRoleTrustRelationshipException(_inner) => ::std::option::Option::Some(_inner),
476 Self::InvalidUserPoolConfigurationException(_inner) => ::std::option::Option::Some(_inner),
477 Self::MfaMethodNotFoundException(_inner) => ::std::option::Option::Some(_inner),
478 Self::NotAuthorizedException(_inner) => ::std::option::Option::Some(_inner),
479 Self::PasswordHistoryPolicyViolationException(_inner) => ::std::option::Option::Some(_inner),
480 Self::PasswordResetRequiredException(_inner) => ::std::option::Option::Some(_inner),
481 Self::ResourceNotFoundException(_inner) => ::std::option::Option::Some(_inner),
482 Self::SoftwareTokenMfaNotFoundException(_inner) => ::std::option::Option::Some(_inner),
483 Self::TooManyRequestsException(_inner) => ::std::option::Option::Some(_inner),
484 Self::UnexpectedLambdaException(_inner) => ::std::option::Option::Some(_inner),
485 Self::UserLambdaValidationException(_inner) => ::std::option::Option::Some(_inner),
486 Self::UserNotConfirmedException(_inner) => ::std::option::Option::Some(_inner),
487 Self::UserNotFoundException(_inner) => ::std::option::Option::Some(_inner),
488 Self::Unhandled(_inner) => ::std::option::Option::Some(&*_inner.source),
489 }
490 }
491}
492impl ::std::fmt::Display for AdminRespondToAuthChallengeError {
493 fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
494 match self {
495 Self::AliasExistsException(_inner) => _inner.fmt(f),
496 Self::CodeMismatchException(_inner) => _inner.fmt(f),
497 Self::ExpiredCodeException(_inner) => _inner.fmt(f),
498 Self::InternalErrorException(_inner) => _inner.fmt(f),
499 Self::InvalidEmailRoleAccessPolicyException(_inner) => _inner.fmt(f),
500 Self::InvalidLambdaResponseException(_inner) => _inner.fmt(f),
501 Self::InvalidParameterException(_inner) => _inner.fmt(f),
502 Self::InvalidPasswordException(_inner) => _inner.fmt(f),
503 Self::InvalidSmsRoleAccessPolicyException(_inner) => _inner.fmt(f),
504 Self::InvalidSmsRoleTrustRelationshipException(_inner) => _inner.fmt(f),
505 Self::InvalidUserPoolConfigurationException(_inner) => _inner.fmt(f),
506 Self::MfaMethodNotFoundException(_inner) => _inner.fmt(f),
507 Self::NotAuthorizedException(_inner) => _inner.fmt(f),
508 Self::PasswordHistoryPolicyViolationException(_inner) => _inner.fmt(f),
509 Self::PasswordResetRequiredException(_inner) => _inner.fmt(f),
510 Self::ResourceNotFoundException(_inner) => _inner.fmt(f),
511 Self::SoftwareTokenMfaNotFoundException(_inner) => _inner.fmt(f),
512 Self::TooManyRequestsException(_inner) => _inner.fmt(f),
513 Self::UnexpectedLambdaException(_inner) => _inner.fmt(f),
514 Self::UserLambdaValidationException(_inner) => _inner.fmt(f),
515 Self::UserNotConfirmedException(_inner) => _inner.fmt(f),
516 Self::UserNotFoundException(_inner) => _inner.fmt(f),
517 Self::Unhandled(_inner) => {
518 if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
519 write!(f, "unhandled error ({code})")
520 } else {
521 f.write_str("unhandled error")
522 }
523 }
524 }
525 }
526}
527impl ::aws_smithy_types::retry::ProvideErrorKind for AdminRespondToAuthChallengeError {
528 fn code(&self) -> ::std::option::Option<&str> {
529 ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
530 }
531 fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
532 ::std::option::Option::None
533 }
534}
535impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for AdminRespondToAuthChallengeError {
536 fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
537 match self {
538 Self::AliasExistsException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
539 Self::CodeMismatchException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
540 Self::ExpiredCodeException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
541 Self::InternalErrorException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
542 Self::InvalidEmailRoleAccessPolicyException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
543 Self::InvalidLambdaResponseException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
544 Self::InvalidParameterException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
545 Self::InvalidPasswordException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
546 Self::InvalidSmsRoleAccessPolicyException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
547 Self::InvalidSmsRoleTrustRelationshipException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
548 Self::InvalidUserPoolConfigurationException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
549 Self::MfaMethodNotFoundException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
550 Self::NotAuthorizedException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
551 Self::PasswordHistoryPolicyViolationException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
552 Self::PasswordResetRequiredException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
553 Self::ResourceNotFoundException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
554 Self::SoftwareTokenMfaNotFoundException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
555 Self::TooManyRequestsException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
556 Self::UnexpectedLambdaException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
557 Self::UserLambdaValidationException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
558 Self::UserNotConfirmedException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
559 Self::UserNotFoundException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
560 Self::Unhandled(_inner) => &_inner.meta,
561 }
562 }
563}
564impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for AdminRespondToAuthChallengeError {
565 fn create_unhandled_error(
566 source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
567 meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>,
568 ) -> Self {
569 Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
570 source,
571 meta: meta.unwrap_or_default(),
572 })
573 }
574}
575impl ::aws_types::request_id::RequestId for crate::operation::admin_respond_to_auth_challenge::AdminRespondToAuthChallengeError {
576 fn request_id(&self) -> Option<&str> {
577 self.meta().request_id()
578 }
579}
580
581pub use crate::operation::admin_respond_to_auth_challenge::_admin_respond_to_auth_challenge_output::AdminRespondToAuthChallengeOutput;
582
583pub use crate::operation::admin_respond_to_auth_challenge::_admin_respond_to_auth_challenge_input::AdminRespondToAuthChallengeInput;
584
585mod _admin_respond_to_auth_challenge_input;
586
587mod _admin_respond_to_auth_challenge_output;
588
589pub mod builders;