aws_sdk_sts/protocol_serde/
shape_assume_role.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2#[allow(clippy::unnecessary_wraps)]
3pub fn de_assume_role_http_error(
4    _response_status: u16,
5    _response_headers: &::aws_smithy_runtime_api::http::Headers,
6    _response_body: &[u8],
7) -> std::result::Result<crate::operation::assume_role::AssumeRoleOutput, crate::operation::assume_role::AssumeRoleError> {
8    #[allow(unused_mut)]
9    let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
10        .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
11    generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
12    let generic = generic_builder.build();
13    let error_code = match generic.code() {
14        Some(code) => code,
15        None => return Err(crate::operation::assume_role::AssumeRoleError::unhandled(generic)),
16    };
17
18    let _error_message = generic.message().map(|msg| msg.to_owned());
19    Err(match error_code {
20        "ExpiredTokenException" => crate::operation::assume_role::AssumeRoleError::ExpiredTokenException({
21            #[allow(unused_mut)]
22            let mut tmp = {
23                #[allow(unused_mut)]
24                let mut output = crate::types::error::builders::ExpiredTokenExceptionBuilder::default();
25                output = crate::protocol_serde::shape_expired_token_exception::de_expired_token_exception_xml_err(_response_body, output)
26                    .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
27                let output = output.meta(generic);
28                output.build()
29            };
30            if tmp.message.is_none() {
31                tmp.message = _error_message;
32            }
33            tmp
34        }),
35        "MalformedPolicyDocument" => crate::operation::assume_role::AssumeRoleError::MalformedPolicyDocumentException({
36            #[allow(unused_mut)]
37            let mut tmp = {
38                #[allow(unused_mut)]
39                let mut output = crate::types::error::builders::MalformedPolicyDocumentExceptionBuilder::default();
40                output = crate::protocol_serde::shape_malformed_policy_document_exception::de_malformed_policy_document_exception_xml_err(
41                    _response_body,
42                    output,
43                )
44                .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
45                let output = output.meta(generic);
46                output.build()
47            };
48            if tmp.message.is_none() {
49                tmp.message = _error_message;
50            }
51            tmp
52        }),
53        "PackedPolicyTooLarge" => crate::operation::assume_role::AssumeRoleError::PackedPolicyTooLargeException({
54            #[allow(unused_mut)]
55            let mut tmp = {
56                #[allow(unused_mut)]
57                let mut output = crate::types::error::builders::PackedPolicyTooLargeExceptionBuilder::default();
58                output = crate::protocol_serde::shape_packed_policy_too_large_exception::de_packed_policy_too_large_exception_xml_err(
59                    _response_body,
60                    output,
61                )
62                .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
63                let output = output.meta(generic);
64                output.build()
65            };
66            if tmp.message.is_none() {
67                tmp.message = _error_message;
68            }
69            tmp
70        }),
71        "RegionDisabledException" => crate::operation::assume_role::AssumeRoleError::RegionDisabledException({
72            #[allow(unused_mut)]
73            let mut tmp = {
74                #[allow(unused_mut)]
75                let mut output = crate::types::error::builders::RegionDisabledExceptionBuilder::default();
76                output = crate::protocol_serde::shape_region_disabled_exception::de_region_disabled_exception_xml_err(_response_body, output)
77                    .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
78                let output = output.meta(generic);
79                output.build()
80            };
81            if tmp.message.is_none() {
82                tmp.message = _error_message;
83            }
84            tmp
85        }),
86        _ => crate::operation::assume_role::AssumeRoleError::generic(generic),
87    })
88}
89
90#[allow(clippy::unnecessary_wraps)]
91pub fn de_assume_role_http_response(
92    _response_status: u16,
93    _response_headers: &::aws_smithy_runtime_api::http::Headers,
94    _response_body: &[u8],
95) -> std::result::Result<crate::operation::assume_role::AssumeRoleOutput, crate::operation::assume_role::AssumeRoleError> {
96    Ok({
97        #[allow(unused_mut)]
98        let mut output = crate::operation::assume_role::builders::AssumeRoleOutputBuilder::default();
99        output = crate::protocol_serde::shape_assume_role::de_assume_role(_response_body, output)
100            .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
101        output._set_request_id(::aws_types::request_id::RequestId::request_id(_response_headers).map(str::to_string));
102        output.build()
103    })
104}
105
106#[allow(unused_mut)]
107pub fn de_assume_role(
108    inp: &[u8],
109    mut builder: crate::operation::assume_role::builders::AssumeRoleOutputBuilder,
110) -> std::result::Result<crate::operation::assume_role::builders::AssumeRoleOutputBuilder, ::aws_smithy_xml::decode::XmlDecodeError> {
111    let mut doc = ::aws_smithy_xml::decode::Document::try_from(inp)?;
112
113    #[allow(unused_mut)]
114    let mut decoder = doc.root_element()?;
115    #[allow(unused_variables)]
116    let start_el = decoder.start_el();
117    if !(start_el.matches("AssumeRoleResponse")) {
118        return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(format!(
119            "invalid root, expected AssumeRoleResponse got {start_el:?}"
120        )));
121    }
122    if let Some(mut result_tag) = decoder.next_tag() {
123        let start_el = result_tag.start_el();
124        if !(start_el.matches("AssumeRoleResult")) {
125            return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(format!(
126                "invalid result, expected AssumeRoleResult got {start_el:?}"
127            )));
128        }
129        while let Some(mut tag) = result_tag.next_tag() {
130            match tag.start_el() {
131            s if s.matches("Credentials") /* Credentials com.amazonaws.sts.synthetic#AssumeRoleOutput$Credentials */ =>  {
132                let var_1 =
133                    Some(
134                        crate::protocol_serde::shape_credentials::de_credentials(&mut tag)
135                        ?
136                    )
137                ;
138                builder = builder.set_credentials(var_1);
139            }
140            ,
141            s if s.matches("AssumedRoleUser") /* AssumedRoleUser com.amazonaws.sts.synthetic#AssumeRoleOutput$AssumedRoleUser */ =>  {
142                let var_2 =
143                    Some(
144                        crate::protocol_serde::shape_assumed_role_user::de_assumed_role_user(&mut tag)
145                        ?
146                    )
147                ;
148                builder = builder.set_assumed_role_user(var_2);
149            }
150            ,
151            s if s.matches("PackedPolicySize") /* PackedPolicySize com.amazonaws.sts.synthetic#AssumeRoleOutput$PackedPolicySize */ =>  {
152                let var_3 =
153                    Some(
154                         {
155                            <i32 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive(
156                                ::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
157                            )
158                            .map_err(|_|::aws_smithy_xml::decode::XmlDecodeError::custom("expected (integer: `com.amazonaws.sts#nonNegativeIntegerType`)"))
159                        }
160                        ?
161                    )
162                ;
163                builder = builder.set_packed_policy_size(var_3);
164            }
165            ,
166            s if s.matches("SourceIdentity") /* SourceIdentity com.amazonaws.sts.synthetic#AssumeRoleOutput$SourceIdentity */ =>  {
167                let var_4 =
168                    Some(
169                        Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
170                            ::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
171                            .into()
172                        )
173                        ?
174                    )
175                ;
176                builder = builder.set_source_identity(var_4);
177            }
178            ,
179            _ => {}
180        }
181        }
182    } else {
183        return Err(::aws_smithy_xml::decode::XmlDecodeError::custom("expected AssumeRoleResult tag"));
184    };
185    Ok(builder)
186}