#[allow(clippy::unnecessary_wraps)]
pub fn de_authorize_endpoint_access_http_error(
_response_status: u16,
_response_headers: &::http::header::HeaderMap,
_response_body: &[u8],
) -> std::result::Result<
crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessOutput,
crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError,
> {
#[allow(unused_mut)]
let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
.map_err(crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::unhandled)?;
generic_builder = ::aws_http::request_id::apply_request_id(generic_builder, _response_headers);
let generic = generic_builder.build();
let error_code = match generic.code() {
Some(code) => code,
None => {
return Err(crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::unhandled(
generic,
))
}
};
let _error_message = generic.message().map(|msg| msg.to_owned());
Err(match error_code {
"ClusterNotFound" => crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::ClusterNotFoundFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::ClusterNotFoundFaultBuilder::default();
output = crate::protocol_serde::shape_cluster_not_found_fault::de_cluster_not_found_fault_xml_err(_response_body, output)
.map_err(crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"EndpointAuthorizationAlreadyExists" => {
crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::EndpointAuthorizationAlreadyExistsFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::EndpointAuthorizationAlreadyExistsFaultBuilder::default();
output = crate::protocol_serde::shape_endpoint_authorization_already_exists_fault::de_endpoint_authorization_already_exists_fault_xml_err(_response_body, output).map_err(crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
})
}
"EndpointAuthorizationsPerClusterLimitExceeded" => {
crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::EndpointAuthorizationsPerClusterLimitExceededFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::EndpointAuthorizationsPerClusterLimitExceededFaultBuilder::default();
output = crate::protocol_serde::shape_endpoint_authorizations_per_cluster_limit_exceeded_fault::de_endpoint_authorizations_per_cluster_limit_exceeded_fault_xml_err(_response_body, output).map_err(crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
})
}
"InvalidAuthorizationState" => crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::InvalidAuthorizationStateFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::InvalidAuthorizationStateFaultBuilder::default();
output = crate::protocol_serde::shape_invalid_authorization_state_fault::de_invalid_authorization_state_fault_xml_err(
_response_body,
output,
)
.map_err(crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"InvalidClusterState" => crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::InvalidClusterStateFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::InvalidClusterStateFaultBuilder::default();
output = crate::protocol_serde::shape_invalid_cluster_state_fault::de_invalid_cluster_state_fault_xml_err(_response_body, output)
.map_err(crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"UnsupportedOperation" => crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::UnsupportedOperationFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::UnsupportedOperationFaultBuilder::default();
output = crate::protocol_serde::shape_unsupported_operation_fault::de_unsupported_operation_fault_xml_err(_response_body, output)
.map_err(crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
_ => crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::generic(generic),
})
}
#[allow(clippy::unnecessary_wraps)]
pub fn de_authorize_endpoint_access_http_response(
_response_status: u16,
_response_headers: &::http::header::HeaderMap,
_response_body: &[u8],
) -> std::result::Result<
crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessOutput,
crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError,
> {
Ok({
#[allow(unused_mut)]
let mut output = crate::operation::authorize_endpoint_access::builders::AuthorizeEndpointAccessOutputBuilder::default();
output = crate::protocol_serde::shape_authorize_endpoint_access::de_authorize_endpoint_access(_response_body, output)
.map_err(crate::operation::authorize_endpoint_access::AuthorizeEndpointAccessError::unhandled)?;
output._set_request_id(::aws_http::request_id::RequestId::request_id(_response_headers).map(str::to_string));
output.build()
})
}
#[allow(unused_mut)]
pub fn de_authorize_endpoint_access(
inp: &[u8],
mut builder: crate::operation::authorize_endpoint_access::builders::AuthorizeEndpointAccessOutputBuilder,
) -> Result<crate::operation::authorize_endpoint_access::builders::AuthorizeEndpointAccessOutputBuilder, ::aws_smithy_xml::decode::XmlDecodeError> {
let mut doc = ::aws_smithy_xml::decode::Document::try_from(inp)?;
#[allow(unused_mut)]
let mut decoder = doc.root_element()?;
#[allow(unused_variables)]
let start_el = decoder.start_el();
if !(start_el.matches("AuthorizeEndpointAccessResponse")) {
return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(format!(
"invalid root, expected AuthorizeEndpointAccessResponse got {:?}",
start_el
)));
}
if let Some(mut result_tag) = decoder.next_tag() {
let start_el = result_tag.start_el();
if !(start_el.matches("AuthorizeEndpointAccessResult")) {
return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(format!(
"invalid result, expected AuthorizeEndpointAccessResult got {:?}",
start_el
)));
}
while let Some(mut tag) = result_tag.next_tag() {
match tag.start_el() {
s if s.matches("Grantor") => {
let var_1 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_grantor(var_1);
}
,
s if s.matches("Grantee") => {
let var_2 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_grantee(var_2);
}
,
s if s.matches("ClusterIdentifier") => {
let var_3 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_cluster_identifier(var_3);
}
,
s if s.matches("AuthorizeTime") => {
let var_4 =
Some(
::aws_smithy_types::DateTime::from_str(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
, ::aws_smithy_types::date_time::Format::DateTimeWithOffset
)
.map_err(|_|::aws_smithy_xml::decode::XmlDecodeError::custom("expected (timestamp: `com.amazonaws.redshift#TStamp`)"))
?
)
;
builder = builder.set_authorize_time(var_4);
}
,
s if s.matches("ClusterStatus") => {
let var_5 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_cluster_status(var_5);
}
,
s if s.matches("Status") => {
let var_6 =
Some(
Result::<crate::types::AuthorizationStatus, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
crate::types::AuthorizationStatus::from(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
)
)
?
)
;
builder = builder.set_status(var_6);
}
,
s if s.matches("AllowedAllVPCs") => {
let var_7 =
Some(
{
<bool as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
)
.map_err(|_|::aws_smithy_xml::decode::XmlDecodeError::custom("expected (boolean: `com.amazonaws.redshift#Boolean`)"))
}
?
)
;
builder = builder.set_allowed_all_vp_cs(var_7);
}
,
s if s.matches("AllowedVPCs") => {
let var_8 =
Some(
crate::protocol_serde::shape_vpc_identifier_list::de_vpc_identifier_list(&mut tag)
?
)
;
builder = builder.set_allowed_vp_cs(var_8);
}
,
s if s.matches("EndpointCount") => {
let var_9 =
Some(
{
<i32 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
)
.map_err(|_|::aws_smithy_xml::decode::XmlDecodeError::custom("expected (integer: `com.amazonaws.redshift#Integer`)"))
}
?
)
;
builder = builder.set_endpoint_count(var_9);
}
,
_ => {}
}
}
} else {
return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(
"expected AuthorizeEndpointAccessResult tag",
));
};
Ok(builder)
}