#[allow(clippy::unnecessary_wraps)]
pub fn de_enable_hosted_zone_dnssec_http_error(
_response_status: u16,
_response_headers: &::aws_smithy_runtime_api::http::Headers,
_response_body: &[u8],
) -> std::result::Result<
crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDnssecOutput,
crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError,
> {
#[allow(unused_mut)]
let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
let generic = generic_builder.build();
let error_code = match generic.code() {
Some(code) => code,
None => {
return Err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled(
generic,
))
}
};
let _error_message = generic.message().map(|msg| msg.to_owned());
Err(match error_code {
"ConcurrentModification" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::ConcurrentModification({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::ConcurrentModificationBuilder::default();
output = crate::protocol_serde::shape_concurrent_modification::de_concurrent_modification_xml_err(_response_body, output)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"DNSSECNotFound" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::DnssecNotFound({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::DnssecNotFoundBuilder::default();
output = crate::protocol_serde::shape_dnssec_not_found::de_dnssec_not_found_xml_err(_response_body, output)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"HostedZonePartiallyDelegated" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::HostedZonePartiallyDelegated({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::HostedZonePartiallyDelegatedBuilder::default();
output =
crate::protocol_serde::shape_hosted_zone_partially_delegated::de_hosted_zone_partially_delegated_xml_err(_response_body, output)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"InvalidArgument" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::InvalidArgument({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::InvalidArgumentBuilder::default();
output = crate::protocol_serde::shape_invalid_argument::de_invalid_argument_xml_err(_response_body, output)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"InvalidInput" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::InvalidInput({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::InvalidInputBuilder::default();
output = crate::protocol_serde::shape_invalid_input::de_invalid_input_xml_err(_response_body, output)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"InvalidKeySigningKeyStatus" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::InvalidKeySigningKeyStatus({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::InvalidKeySigningKeyStatusBuilder::default();
output =
crate::protocol_serde::shape_invalid_key_signing_key_status::de_invalid_key_signing_key_status_xml_err(_response_body, output)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"InvalidKMSArn" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::InvalidKmsArn({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::InvalidKmsArnBuilder::default();
output = crate::protocol_serde::shape_invalid_kms_arn::de_invalid_kms_arn_xml_err(_response_body, output)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
"KeySigningKeyWithActiveStatusNotFound" => {
crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::KeySigningKeyWithActiveStatusNotFound({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::KeySigningKeyWithActiveStatusNotFoundBuilder::default();
output = crate::protocol_serde::shape_key_signing_key_with_active_status_not_found::de_key_signing_key_with_active_status_not_found_xml_err(_response_body, output).map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
})
}
"NoSuchHostedZone" => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::NoSuchHostedZone({
#[allow(unused_mut)]
let mut tmp = {
#[allow(unused_mut)]
let mut output = crate::types::error::builders::NoSuchHostedZoneBuilder::default();
output = crate::protocol_serde::shape_no_such_hosted_zone::de_no_such_hosted_zone_xml_err(_response_body, output)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
let output = output.meta(generic);
output.build()
};
if tmp.message.is_none() {
tmp.message = _error_message;
}
tmp
}),
_ => crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::generic(generic),
})
}
#[allow(clippy::unnecessary_wraps)]
pub fn de_enable_hosted_zone_dnssec_http_response(
_response_status: u16,
_response_headers: &::aws_smithy_runtime_api::http::Headers,
_response_body: &[u8],
) -> std::result::Result<
crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDnssecOutput,
crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError,
> {
Ok({
#[allow(unused_mut)]
let mut output = crate::operation::enable_hosted_zone_dnssec::builders::EnableHostedZoneDnssecOutputBuilder::default();
output = crate::protocol_serde::shape_enable_hosted_zone_dnssec::de_enable_hosted_zone_dnssec(_response_body, output)
.map_err(crate::operation::enable_hosted_zone_dnssec::EnableHostedZoneDNSSECError::unhandled)?;
output._set_request_id(::aws_types::request_id::RequestId::request_id(_response_headers).map(str::to_string));
crate::serde_util::enable_hosted_zone_dnssec_output_output_correct_errors(output).build()
})
}
#[allow(unused_mut)]
pub fn de_enable_hosted_zone_dnssec(
inp: &[u8],
mut builder: crate::operation::enable_hosted_zone_dnssec::builders::EnableHostedZoneDnssecOutputBuilder,
) -> std::result::Result<
crate::operation::enable_hosted_zone_dnssec::builders::EnableHostedZoneDnssecOutputBuilder,
::aws_smithy_xml::decode::XmlDecodeError,
> {
let mut doc = ::aws_smithy_xml::decode::Document::try_from(inp)?;
#[allow(unused_mut)]
let mut decoder = doc.root_element()?;
#[allow(unused_variables)]
let start_el = decoder.start_el();
if !start_el.matches("EnableHostedZoneDNSSECResponse") {
return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(format!(
"encountered invalid XML root: expected EnableHostedZoneDNSSECResponse but got {start_el:?}. This is likely a bug in the SDK."
)));
}
while let Some(mut tag) = decoder.next_tag() {
match tag.start_el() {
s if s.matches("ChangeInfo") => {
let var_1 =
Some(
crate::protocol_serde::shape_change_info::de_change_info(&mut tag)
?
)
;
builder = builder.set_change_info(var_1);
}
,
_ => {}
}
}
Ok(builder)
}