pub fn ser_sign_input(
input: &crate::operation::sign::SignInput,
) -> Result<aws_smithy_http::body::SdkBody, aws_smithy_http::operation::error::SerializationError> {
let mut out = String::new();
let mut object = aws_smithy_json::serialize::JsonObjectWriter::new(&mut out);
crate::protocol_serde::shape_sign_input::ser_sign_input(&mut object, input)?;
object.finish();
Ok(aws_smithy_http::body::SdkBody::from(out))
}
#[allow(clippy::unnecessary_wraps)]
pub fn de_sign_http_error(
response: &http::Response<bytes::Bytes>,
) -> std::result::Result<crate::operation::sign::SignOutput, crate::operation::sign::SignError> {
#[allow(unused_mut)]
let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(response)
.map_err(crate::operation::sign::SignError::unhandled)?;
generic_builder = aws_http::request_id::apply_request_id(generic_builder, response.headers());
let generic = generic_builder.build();
let error_code = match generic.code() {
Some(code) => code,
None => return Err(crate::operation::sign::SignError::unhandled(generic)),
};
let _error_message = generic.message().map(|msg| msg.to_owned());
Err(match error_code {
"DependencyTimeoutException" => {
crate::operation::sign::SignError::DependencyTimeoutException({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output =
crate::types::error::builders::DependencyTimeoutExceptionBuilder::default();
let _ = response;
output = crate::protocol_serde::shape_dependency_timeout_exception::de_dependency_timeout_exception_json_err(response.body().as_ref(), output).map_err(crate::operation::sign::SignError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
})
}
"DisabledException" => crate::operation::sign::SignError::DisabledException({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::DisabledExceptionBuilder::default();
let _ = response;
output = crate::protocol_serde::shape_disabled_exception::de_disabled_exception_json_err(response.body().as_ref(), output).map_err(crate::operation::sign::SignError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"InvalidGrantTokenException" => {
crate::operation::sign::SignError::InvalidGrantTokenException({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output =
crate::types::error::builders::InvalidGrantTokenExceptionBuilder::default();
let _ = response;
output = crate::protocol_serde::shape_invalid_grant_token_exception::de_invalid_grant_token_exception_json_err(response.body().as_ref(), output).map_err(crate::operation::sign::SignError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
})
}
"InvalidKeyUsageException" => {
crate::operation::sign::SignError::InvalidKeyUsageException({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output =
crate::types::error::builders::InvalidKeyUsageExceptionBuilder::default();
let _ = response;
output = crate::protocol_serde::shape_invalid_key_usage_exception::de_invalid_key_usage_exception_json_err(response.body().as_ref(), output).map_err(crate::operation::sign::SignError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
})
}
"KeyUnavailableException" => crate::operation::sign::SignError::KeyUnavailableException({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output =
crate::types::error::builders::KeyUnavailableExceptionBuilder::default();
let _ = response;
output = crate::protocol_serde::shape_key_unavailable_exception::de_key_unavailable_exception_json_err(response.body().as_ref(), output).map_err(crate::operation::sign::SignError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"KMSInternalException" => crate::operation::sign::SignError::KmsInternalException({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output =
crate::types::error::builders::KmsInternalExceptionBuilder::default();
let _ = response;
output = crate::protocol_serde::shape_kms_internal_exception::de_kms_internal_exception_json_err(response.body().as_ref(), output).map_err(crate::operation::sign::SignError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"KMSInvalidStateException" => {
crate::operation::sign::SignError::KmsInvalidStateException({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output =
crate::types::error::builders::KmsInvalidStateExceptionBuilder::default();
let _ = response;
output = crate::protocol_serde::shape_kms_invalid_state_exception::de_kms_invalid_state_exception_json_err(response.body().as_ref(), output).map_err(crate::operation::sign::SignError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
})
}
"NotFoundException" => crate::operation::sign::SignError::NotFoundException({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::NotFoundExceptionBuilder::default();
let _ = response;
output = crate::protocol_serde::shape_not_found_exception::de_not_found_exception_json_err(response.body().as_ref(), output).map_err(crate::operation::sign::SignError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
_ => crate::operation::sign::SignError::generic(generic),
})
}
#[allow(clippy::unnecessary_wraps)]
pub fn de_sign_http_response(
response: &http::Response<bytes::Bytes>,
) -> std::result::Result<crate::operation::sign::SignOutput, crate::operation::sign::SignError> {
Ok({
#[allow(unused_mut)]
let mut output = crate::operation::sign::builders::SignOutputBuilder::default();
let _ = response;
output = crate::protocol_serde::shape_sign::de_sign(response.body().as_ref(), output)
.map_err(crate::operation::sign::SignError::unhandled)?;
output._set_request_id(
aws_http::request_id::RequestId::request_id(response).map(str::to_string),
);
output.build()
})
}
pub(crate) fn de_sign(
value: &[u8],
mut builder: crate::operation::sign::builders::SignOutputBuilder,
) -> Result<
crate::operation::sign::builders::SignOutputBuilder,
aws_smithy_json::deserialize::error::DeserializeError,
> {
let mut tokens_owned =
aws_smithy_json::deserialize::json_token_iter(crate::protocol_serde::or_empty_doc(value))
.peekable();
let tokens = &mut tokens_owned;
aws_smithy_json::deserialize::token::expect_start_object(tokens.next())?;
loop {
match tokens.next().transpose()? {
Some(aws_smithy_json::deserialize::Token::EndObject { .. }) => break,
Some(aws_smithy_json::deserialize::Token::ObjectKey { key, .. }) => {
match key.to_unescaped()?.as_ref() {
"KeyId" => {
builder = builder.set_key_id(
aws_smithy_json::deserialize::token::expect_string_or_null(
tokens.next(),
)?
.map(|s| s.to_unescaped().map(|u| u.into_owned()))
.transpose()?,
);
}
"Signature" => {
builder = builder.set_signature(
aws_smithy_json::deserialize::token::expect_blob_or_null(
tokens.next(),
)?,
);
}
"SigningAlgorithm" => {
builder = builder.set_signing_algorithm(
aws_smithy_json::deserialize::token::expect_string_or_null(
tokens.next(),
)?
.map(|s| {
s.to_unescaped()
.map(|u| crate::types::SigningAlgorithmSpec::from(u.as_ref()))
})
.transpose()?,
);
}
_ => aws_smithy_json::deserialize::token::skip_value(tokens)?,
}
}
other => {
return Err(
aws_smithy_json::deserialize::error::DeserializeError::custom(format!(
"expected object key or end object, found: {:?}",
other
)),
)
}
}
}
if tokens.next().is_some() {
return Err(
aws_smithy_json::deserialize::error::DeserializeError::custom(
"found more JSON tokens after completing parsing",
),
);
}
Ok(builder)
}