#[allow(clippy::unnecessary_wraps)]
pub fn de_authorize_snapshot_access_http_error(
_response_status: u16,
_response_headers: &::aws_smithy_runtime_api::http::Headers,
_response_body: &[u8],
) -> std::result::Result<
crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessOutput,
crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError,
> {
#[allow(unused_mut)]
let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
.map_err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled)?;
generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
let generic = generic_builder.build();
let error_code = match generic.code() {
Some(code) => code,
None => {
return Err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled(
generic,
))
}
};
let _error_message = generic.message().map(|msg| msg.to_owned());
Err(match error_code {
"AuthorizationAlreadyExists" => crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::AuthorizationAlreadyExistsFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::AuthorizationAlreadyExistsFaultBuilder::default();
output = crate::protocol_serde::shape_authorization_already_exists_fault::de_authorization_already_exists_fault_xml_err(
_response_body,
output,
)
.map_err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"AuthorizationQuotaExceeded" => crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::AuthorizationQuotaExceededFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::AuthorizationQuotaExceededFaultBuilder::default();
output = crate::protocol_serde::shape_authorization_quota_exceeded_fault::de_authorization_quota_exceeded_fault_xml_err(
_response_body,
output,
)
.map_err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"ClusterSnapshotNotFound" => crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::ClusterSnapshotNotFoundFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::ClusterSnapshotNotFoundFaultBuilder::default();
output = crate::protocol_serde::shape_cluster_snapshot_not_found_fault::de_cluster_snapshot_not_found_fault_xml_err(
_response_body,
output,
)
.map_err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"DependentServiceRequestThrottlingFault" => {
crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::DependentServiceRequestThrottlingFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::DependentServiceRequestThrottlingFaultBuilder::default();
output = crate::protocol_serde::shape_dependent_service_request_throttling_fault::de_dependent_service_request_throttling_fault_xml_err(_response_body, output).map_err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
})
}
"InvalidClusterSnapshotState" => {
crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::InvalidClusterSnapshotStateFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::InvalidClusterSnapshotStateFaultBuilder::default();
output = crate::protocol_serde::shape_invalid_cluster_snapshot_state_fault::de_invalid_cluster_snapshot_state_fault_xml_err(
_response_body,
output,
)
.map_err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
})
}
"LimitExceededFault" => crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::LimitExceededFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::LimitExceededFaultBuilder::default();
output = crate::protocol_serde::shape_limit_exceeded_fault::de_limit_exceeded_fault_xml_err(_response_body, output)
.map_err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"UnsupportedOperation" => crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::UnsupportedOperationFault({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::UnsupportedOperationFaultBuilder::default();
output = crate::protocol_serde::shape_unsupported_operation_fault::de_unsupported_operation_fault_xml_err(_response_body, output)
.map_err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
_ => crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::generic(generic),
})
}
#[allow(clippy::unnecessary_wraps)]
pub fn de_authorize_snapshot_access_http_response(
_response_status: u16,
_response_headers: &::aws_smithy_runtime_api::http::Headers,
_response_body: &[u8],
) -> std::result::Result<
crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessOutput,
crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError,
> {
Ok({
#[allow(unused_mut)]
let mut output = crate::operation::authorize_snapshot_access::builders::AuthorizeSnapshotAccessOutputBuilder::default();
output = crate::protocol_serde::shape_authorize_snapshot_access::de_authorize_snapshot_access(_response_body, output)
.map_err(crate::operation::authorize_snapshot_access::AuthorizeSnapshotAccessError::unhandled)?;
output._set_request_id(::aws_types::request_id::RequestId::request_id(_response_headers).map(str::to_string));
output.build()
})
}
#[allow(unused_mut)]
pub fn de_authorize_snapshot_access(
inp: &[u8],
mut builder: crate::operation::authorize_snapshot_access::builders::AuthorizeSnapshotAccessOutputBuilder,
) -> std::result::Result<
crate::operation::authorize_snapshot_access::builders::AuthorizeSnapshotAccessOutputBuilder,
::aws_smithy_xml::decode::XmlDecodeError,
> {
let mut doc = ::aws_smithy_xml::decode::Document::try_from(inp)?;
#[allow(unused_mut)]
let mut decoder = doc.root_element()?;
#[allow(unused_variables)]
let start_el = decoder.start_el();
if !(start_el.matches("AuthorizeSnapshotAccessResponse")) {
return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(format!(
"invalid root, expected AuthorizeSnapshotAccessResponse got {start_el:?}"
)));
}
if let Some(mut result_tag) = decoder.next_tag() {
let start_el = result_tag.start_el();
if !(start_el.matches("AuthorizeSnapshotAccessResult")) {
return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(format!(
"invalid result, expected AuthorizeSnapshotAccessResult got {start_el:?}"
)));
}
while let Some(mut tag) = result_tag.next_tag() {
match tag.start_el() {
s if s.matches("Snapshot") => {
let var_1 =
Some(
crate::protocol_serde::shape_snapshot::de_snapshot(&mut tag)
?
)
;
builder = builder.set_snapshot(var_1);
}
,
_ => {}
}
}
} else {
return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(
"expected AuthorizeSnapshotAccessResult tag",
));
};
Ok(builder)
}