aws_sdk_sts/protocol_serde/
shape_assume_role.rs1#[allow(clippy::unnecessary_wraps)]
3pub fn de_assume_role_http_error(
4 _response_status: u16,
5 _response_headers: &::aws_smithy_runtime_api::http::Headers,
6 _response_body: &[u8],
7) -> std::result::Result<crate::operation::assume_role::AssumeRoleOutput, crate::operation::assume_role::AssumeRoleError> {
8 #[allow(unused_mut)]
9 let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
10 .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
11 generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
12 let generic = generic_builder.build();
13 let error_code = match generic.code() {
14 Some(code) => code,
15 None => return Err(crate::operation::assume_role::AssumeRoleError::unhandled(generic)),
16 };
17
18 let _error_message = generic.message().map(|msg| msg.to_owned());
19 Err(match error_code {
20 "ExpiredTokenException" => crate::operation::assume_role::AssumeRoleError::ExpiredTokenException({
21 #[allow(unused_mut)]
22 let mut tmp = {
23 #[allow(unused_mut)]
24 let mut output = crate::types::error::builders::ExpiredTokenExceptionBuilder::default();
25 output = crate::protocol_serde::shape_expired_token_exception::de_expired_token_exception_xml_err(_response_body, output)
26 .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
27 let output = output.meta(generic);
28 output.build()
29 };
30 if tmp.message.is_none() {
31 tmp.message = _error_message;
32 }
33 tmp
34 }),
35 "MalformedPolicyDocument" => crate::operation::assume_role::AssumeRoleError::MalformedPolicyDocumentException({
36 #[allow(unused_mut)]
37 let mut tmp = {
38 #[allow(unused_mut)]
39 let mut output = crate::types::error::builders::MalformedPolicyDocumentExceptionBuilder::default();
40 output = crate::protocol_serde::shape_malformed_policy_document_exception::de_malformed_policy_document_exception_xml_err(
41 _response_body,
42 output,
43 )
44 .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
45 let output = output.meta(generic);
46 output.build()
47 };
48 if tmp.message.is_none() {
49 tmp.message = _error_message;
50 }
51 tmp
52 }),
53 "PackedPolicyTooLarge" => crate::operation::assume_role::AssumeRoleError::PackedPolicyTooLargeException({
54 #[allow(unused_mut)]
55 let mut tmp = {
56 #[allow(unused_mut)]
57 let mut output = crate::types::error::builders::PackedPolicyTooLargeExceptionBuilder::default();
58 output = crate::protocol_serde::shape_packed_policy_too_large_exception::de_packed_policy_too_large_exception_xml_err(
59 _response_body,
60 output,
61 )
62 .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
63 let output = output.meta(generic);
64 output.build()
65 };
66 if tmp.message.is_none() {
67 tmp.message = _error_message;
68 }
69 tmp
70 }),
71 "RegionDisabledException" => crate::operation::assume_role::AssumeRoleError::RegionDisabledException({
72 #[allow(unused_mut)]
73 let mut tmp = {
74 #[allow(unused_mut)]
75 let mut output = crate::types::error::builders::RegionDisabledExceptionBuilder::default();
76 output = crate::protocol_serde::shape_region_disabled_exception::de_region_disabled_exception_xml_err(_response_body, output)
77 .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
78 let output = output.meta(generic);
79 output.build()
80 };
81 if tmp.message.is_none() {
82 tmp.message = _error_message;
83 }
84 tmp
85 }),
86 _ => crate::operation::assume_role::AssumeRoleError::generic(generic),
87 })
88}
89
90#[allow(clippy::unnecessary_wraps)]
91pub fn de_assume_role_http_response(
92 _response_status: u16,
93 _response_headers: &::aws_smithy_runtime_api::http::Headers,
94 _response_body: &[u8],
95) -> std::result::Result<crate::operation::assume_role::AssumeRoleOutput, crate::operation::assume_role::AssumeRoleError> {
96 Ok({
97 #[allow(unused_mut)]
98 let mut output = crate::operation::assume_role::builders::AssumeRoleOutputBuilder::default();
99 output = crate::protocol_serde::shape_assume_role::de_assume_role(_response_body, output)
100 .map_err(crate::operation::assume_role::AssumeRoleError::unhandled)?;
101 output._set_request_id(::aws_types::request_id::RequestId::request_id(_response_headers).map(str::to_string));
102 output.build()
103 })
104}
105
106#[allow(unused_mut)]
107pub fn de_assume_role(
108 inp: &[u8],
109 mut builder: crate::operation::assume_role::builders::AssumeRoleOutputBuilder,
110) -> std::result::Result<crate::operation::assume_role::builders::AssumeRoleOutputBuilder, ::aws_smithy_xml::decode::XmlDecodeError> {
111 let mut doc = ::aws_smithy_xml::decode::Document::try_from(inp)?;
112
113 #[allow(unused_mut)]
114 let mut decoder = doc.root_element()?;
115 #[allow(unused_variables)]
116 let start_el = decoder.start_el();
117 if !(start_el.matches("AssumeRoleResponse")) {
118 return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(format!(
119 "invalid root, expected AssumeRoleResponse got {start_el:?}"
120 )));
121 }
122 if let Some(mut result_tag) = decoder.next_tag() {
123 let start_el = result_tag.start_el();
124 if !(start_el.matches("AssumeRoleResult")) {
125 return Err(::aws_smithy_xml::decode::XmlDecodeError::custom(format!(
126 "invalid result, expected AssumeRoleResult got {start_el:?}"
127 )));
128 }
129 while let Some(mut tag) = result_tag.next_tag() {
130 match tag.start_el() {
131 s if s.matches("Credentials") => {
132 let var_1 =
133 Some(
134 crate::protocol_serde::shape_credentials::de_credentials(&mut tag)
135 ?
136 )
137 ;
138 builder = builder.set_credentials(var_1);
139 }
140 ,
141 s if s.matches("AssumedRoleUser") => {
142 let var_2 =
143 Some(
144 crate::protocol_serde::shape_assumed_role_user::de_assumed_role_user(&mut tag)
145 ?
146 )
147 ;
148 builder = builder.set_assumed_role_user(var_2);
149 }
150 ,
151 s if s.matches("PackedPolicySize") => {
152 let var_3 =
153 Some(
154 {
155 <i32 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive(
156 ::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
157 )
158 .map_err(|_|::aws_smithy_xml::decode::XmlDecodeError::custom("expected (integer: `com.amazonaws.sts#nonNegativeIntegerType`)"))
159 }
160 ?
161 )
162 ;
163 builder = builder.set_packed_policy_size(var_3);
164 }
165 ,
166 s if s.matches("SourceIdentity") => {
167 let var_4 =
168 Some(
169 Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
170 ::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
171 .into()
172 )
173 ?
174 )
175 ;
176 builder = builder.set_source_identity(var_4);
177 }
178 ,
179 _ => {}
180 }
181 }
182 } else {
183 return Err(::aws_smithy_xml::decode::XmlDecodeError::custom("expected AssumeRoleResult tag"));
184 };
185 Ok(builder)
186}