Skip to main content

aws_sdk_s3/operation/
update_object_encryption.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2/// Orchestration and serialization glue logic for `UpdateObjectEncryption`.
3#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
4#[non_exhaustive]
5pub struct UpdateObjectEncryption;
6impl UpdateObjectEncryption {
7    /// Creates a new `UpdateObjectEncryption`
8    pub fn new() -> Self {
9        Self
10    }
11    pub(crate) async fn orchestrate(
12        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
13        input: crate::operation::update_object_encryption::UpdateObjectEncryptionInput,
14    ) -> ::std::result::Result<
15        crate::operation::update_object_encryption::UpdateObjectEncryptionOutput,
16        ::aws_smithy_runtime_api::client::result::SdkError<
17            crate::operation::update_object_encryption::UpdateObjectEncryptionError,
18            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
19        >,
20    > {
21        let map_err = |err: ::aws_smithy_runtime_api::client::result::SdkError<
22            ::aws_smithy_runtime_api::client::interceptors::context::Error,
23            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
24        >| {
25            err.map_service_error(|err| {
26                err.downcast::<crate::operation::update_object_encryption::UpdateObjectEncryptionError>()
27                    .expect("correct error type")
28            })
29        };
30        let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
31            .await
32            .map_err(map_err)?;
33        let output = context.finalize().map_err(map_err)?;
34        ::std::result::Result::Ok(
35            output
36                .downcast::<crate::operation::update_object_encryption::UpdateObjectEncryptionOutput>()
37                .expect("correct output type"),
38        )
39    }
40
41    pub(crate) async fn orchestrate_with_stop_point(
42        runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
43        input: crate::operation::update_object_encryption::UpdateObjectEncryptionInput,
44        stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
45    ) -> ::std::result::Result<
46        ::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext,
47        ::aws_smithy_runtime_api::client::result::SdkError<
48            ::aws_smithy_runtime_api::client::interceptors::context::Error,
49            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
50        >,
51    > {
52        let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
53        use ::tracing::Instrument;
54        ::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point("S3", "UpdateObjectEncryption", input, runtime_plugins, stop_point)
55            // Create a parent span for the entire operation. Includes a random, internal-only,
56            // seven-digit ID for the operation orchestration so that it can be correlated in the logs.
57            .instrument(::tracing::debug_span!(
58                "S3.UpdateObjectEncryption",
59                "rpc.service" = "S3",
60                "rpc.method" = "UpdateObjectEncryption",
61                "sdk_invocation_id" = ::fastrand::u32(1_000_000..10_000_000),
62                "rpc.system" = "aws-api",
63            ))
64            .await
65    }
66
67    pub(crate) fn operation_runtime_plugins(
68        client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
69        client_config: &crate::config::Config,
70        config_override: ::std::option::Option<crate::config::Builder>,
71    ) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
72        let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
73
74        if let ::std::option::Option::Some(config_override) = config_override {
75            for plugin in config_override.runtime_plugins.iter().cloned() {
76                runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
77            }
78            runtime_plugins = runtime_plugins.with_operation_plugin(crate::config::ConfigOverrideRuntimePlugin::new(
79                config_override,
80                client_config.config.clone(),
81                &client_config.runtime_components,
82            ));
83        }
84        runtime_plugins
85    }
86}
87impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for UpdateObjectEncryption {
88    fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
89        let mut cfg = ::aws_smithy_types::config_bag::Layer::new("UpdateObjectEncryption");
90
91        cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(
92            UpdateObjectEncryptionRequestSerializer,
93        ));
94        cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(
95            UpdateObjectEncryptionResponseDeserializer,
96        ));
97
98        cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(
99            crate::config::auth::Params::builder()
100                .operation_name("UpdateObjectEncryption")
101                .build()
102                .expect("required fields set"),
103        ));
104
105        cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new(
106            "UpdateObjectEncryption",
107            "S3",
108        ));
109        cfg.store_put(crate::s3_express::checksum::provide_default_checksum_algorithm());
110        let mut signing_options = ::aws_runtime::auth::SigningOptions::default();
111        signing_options.double_uri_encode = false;
112        signing_options.content_sha256_header = true;
113        signing_options.normalize_uri_path = false;
114        signing_options.payload_override = None;
115
116        cfg.store_put(::aws_runtime::auth::SigV4OperationSigningConfig {
117            signing_options,
118            ..::std::default::Default::default()
119        });
120
121        ::std::option::Option::Some(cfg.freeze())
122    }
123
124    fn runtime_components(
125        &self,
126        _: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder,
127    ) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
128        #[allow(unused_mut)]
129        let mut rcb =
130            ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("UpdateObjectEncryption")
131                .with_interceptor(::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default())
132                .with_interceptor(UpdateObjectEncryptionEndpointParamsInterceptor)
133                .with_interceptor(crate::http_request_checksum::RequestChecksumInterceptor::new(
134                    |input: &::aws_smithy_runtime_api::client::interceptors::context::Input| {
135                        let input: &crate::operation::update_object_encryption::UpdateObjectEncryptionInput =
136                            input.downcast_ref().expect("correct type");
137                        let checksum_algorithm = input.checksum_algorithm();
138                        let checksum_algorithm = checksum_algorithm.map(|algorithm| algorithm.as_str());
139                        (checksum_algorithm.map(|s| s.to_string()), true)
140                    },
141                    |request: &mut ::aws_smithy_runtime_api::http::Request, cfg: &::aws_smithy_types::config_bag::ConfigBag| {
142                        // We check if the user has set any of the checksum values manually
143                        let mut user_set_checksum_value = false;
144                        let headers_to_check =
145                            request
146                                .headers()
147                                .iter()
148                                .filter_map(|(name, _val)| if name.starts_with("x-amz-checksum-") { Some(name) } else { None });
149                        for algo_header in headers_to_check {
150                            if request.headers().get(algo_header).is_some() {
151                                user_set_checksum_value = true;
152                            }
153                        }
154
155                        // We check if the user set the checksum algo manually
156                        let user_set_checksum_algo = request.headers().get("x-amz-sdk-checksum-algorithm").is_some();
157
158                        // This value is set by the user on the SdkConfig to indicate their preference
159                        let request_checksum_calculation = cfg
160                            .load::<::aws_smithy_types::checksum_config::RequestChecksumCalculation>()
161                            .unwrap_or(&::aws_smithy_types::checksum_config::RequestChecksumCalculation::WhenSupported);
162
163                        // From the httpChecksum trait
164                        let http_checksum_required = true;
165
166                        let is_presigned_req = cfg.load::<crate::presigning::PresigningMarker>().is_some();
167
168                        // If the request is presigned we do not set a default.
169                        // If the RequestChecksumCalculation is WhenSupported and the user has not set a checksum value or algo
170                        // we set the default. If it is WhenRequired and a checksum is required by the trait and the user has not
171                        // set a checksum value or algo we also set the default. In all other cases we do nothing.
172                        match (
173                            request_checksum_calculation,
174                            http_checksum_required,
175                            user_set_checksum_value,
176                            user_set_checksum_algo,
177                            is_presigned_req,
178                        ) {
179                            (_, _, _, _, true) => {}
180                            (::aws_smithy_types::checksum_config::RequestChecksumCalculation::WhenSupported, _, false, false, _)
181                            | (::aws_smithy_types::checksum_config::RequestChecksumCalculation::WhenRequired, true, false, false, _) => {
182                                request.headers_mut().insert("x-amz-sdk-checksum-algorithm", "CRC32");
183                            }
184                            _ => {}
185                        }
186
187                        // We return a bool indicating if the user did set the checksum value, if they did
188                        // we can short circuit and exit the interceptor early.
189                        Ok(user_set_checksum_value)
190                    },
191                ))
192                .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<
193                    crate::operation::update_object_encryption::UpdateObjectEncryptionError,
194                >::new())
195                .with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<
196                    crate::operation::update_object_encryption::UpdateObjectEncryptionError,
197                >::new())
198                .with_retry_classifier(
199                    ::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<
200                        crate::operation::update_object_encryption::UpdateObjectEncryptionError,
201                    >::builder()
202                    .transient_errors({
203                        let mut transient_errors: Vec<&'static str> = ::aws_runtime::retries::classifiers::TRANSIENT_ERRORS.into();
204                        transient_errors.push("InternalError");
205                        ::std::borrow::Cow::Owned(transient_errors)
206                    })
207                    .build(),
208                );
209
210        ::std::borrow::Cow::Owned(rcb)
211    }
212}
213
214#[derive(Debug)]
215struct UpdateObjectEncryptionResponseDeserializer;
216impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for UpdateObjectEncryptionResponseDeserializer {
217    fn deserialize_nonstreaming(
218        &self,
219        response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
220    ) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
221        let (success, status) = (response.status().is_success(), response.status().as_u16());
222        let headers = response.headers();
223        let body = response.body().bytes().expect("body loaded");
224        #[allow(unused_mut)]
225        let mut force_error = false;
226        ::tracing::debug!(extended_request_id = ?crate::s3_request_id::RequestIdExt::extended_request_id(response));
227        if matches!(crate::rest_xml_unwrapped_errors::body_is_error(body), Ok(true)) {
228            force_error = true;
229        }
230        ::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
231        let parse_result = if !success && status != 200 || force_error {
232            crate::protocol_serde::shape_update_object_encryption::de_update_object_encryption_http_error(status, headers, body)
233        } else {
234            crate::protocol_serde::shape_update_object_encryption::de_update_object_encryption_http_response(status, headers, body)
235        };
236        crate::protocol_serde::type_erase_result(parse_result)
237    }
238}
239#[derive(Debug)]
240struct UpdateObjectEncryptionRequestSerializer;
241impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for UpdateObjectEncryptionRequestSerializer {
242    #[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
243    fn serialize_input(
244        &self,
245        input: ::aws_smithy_runtime_api::client::interceptors::context::Input,
246        _cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
247    ) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
248        let input = input
249            .downcast::<crate::operation::update_object_encryption::UpdateObjectEncryptionInput>()
250            .expect("correct type");
251        let _header_serialization_settings = _cfg
252            .load::<crate::serialization_settings::HeaderSerializationSettings>()
253            .cloned()
254            .unwrap_or_default();
255        let mut request_builder = {
256            #[allow(clippy::uninlined_format_args)]
257            fn uri_base(
258                _input: &crate::operation::update_object_encryption::UpdateObjectEncryptionInput,
259                output: &mut ::std::string::String,
260            ) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
261                use ::std::fmt::Write as _;
262                let input_1 = &_input.key;
263                let input_1 = input_1
264                    .as_ref()
265                    .ok_or_else(|| ::aws_smithy_types::error::operation::BuildError::missing_field("key", "cannot be empty or unset"))?;
266                let key = ::aws_smithy_http::label::fmt_string(input_1, ::aws_smithy_http::label::EncodingStrategy::Greedy);
267                if key.is_empty() {
268                    return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field(
269                        "key",
270                        "cannot be empty or unset",
271                    ));
272                }
273                ::std::write!(output, "/{Key}", Key = key).expect("formatting should succeed");
274                ::std::result::Result::Ok(())
275            }
276            fn uri_query(
277                _input: &crate::operation::update_object_encryption::UpdateObjectEncryptionInput,
278                mut output: &mut ::std::string::String,
279            ) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
280                let mut query = ::aws_smithy_http::query::Writer::new(output);
281                query.push_v("encryption");
282                if let ::std::option::Option::Some(inner_2) = &_input.version_id {
283                    {
284                        query.push_kv("versionId", &::aws_smithy_http::query::fmt_string(inner_2));
285                    }
286                }
287                ::std::result::Result::Ok(())
288            }
289            #[allow(clippy::unnecessary_wraps)]
290            fn update_http_builder(
291                input: &crate::operation::update_object_encryption::UpdateObjectEncryptionInput,
292                builder: ::http_1x::request::Builder,
293            ) -> ::std::result::Result<::http_1x::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
294                let mut uri = ::std::string::String::new();
295                uri_base(input, &mut uri)?;
296                uri_query(input, &mut uri)?;
297                let builder = crate::protocol_serde::shape_update_object_encryption::ser_update_object_encryption_headers(input, builder)?;
298                ::std::result::Result::Ok(builder.method("PUT").uri(uri))
299            }
300            let mut builder = update_http_builder(&input, ::http_1x::request::Builder::new())?;
301            builder = _header_serialization_settings.set_default_header(builder, ::http_1x::header::CONTENT_TYPE, "application/xml");
302            builder
303        };
304        let body = ::aws_smithy_types::body::SdkBody::from(
305            crate::protocol_serde::shape_update_object_encryption_input::ser_object_encryption_http_payload(&input.object_encryption)?,
306        );
307        if let Some(content_length) = body.content_length() {
308            let content_length = content_length.to_string();
309            request_builder = _header_serialization_settings.set_default_header(request_builder, ::http_1x::header::CONTENT_LENGTH, &content_length);
310        }
311        ::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
312    }
313}
314#[derive(Debug)]
315struct UpdateObjectEncryptionEndpointParamsInterceptor;
316
317impl ::aws_smithy_runtime_api::client::interceptors::Intercept for UpdateObjectEncryptionEndpointParamsInterceptor {
318    fn name(&self) -> &'static str {
319        "UpdateObjectEncryptionEndpointParamsInterceptor"
320    }
321
322    fn read_before_execution(
323        &self,
324        context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<
325            '_,
326            ::aws_smithy_runtime_api::client::interceptors::context::Input,
327            ::aws_smithy_runtime_api::client::interceptors::context::Output,
328            ::aws_smithy_runtime_api::client::interceptors::context::Error,
329        >,
330        cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
331    ) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
332        let _input = context
333            .input()
334            .downcast_ref::<UpdateObjectEncryptionInput>()
335            .ok_or("failed to downcast to UpdateObjectEncryptionInput")?;
336
337        let params = crate::config::endpoint::Params::builder()
338            .set_region(cfg.load::<::aws_types::region::Region>().map(|r| r.as_ref().to_owned()))
339            .set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
340            .set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
341            .set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
342            .set_force_path_style(cfg.load::<crate::config::ForcePathStyle>().map(|ty| ty.0))
343            .set_use_arn_region(cfg.load::<crate::config::UseArnRegion>().map(|ty| ty.0))
344            .set_disable_multi_region_access_points(cfg.load::<crate::config::DisableMultiRegionAccessPoints>().map(|ty| ty.0))
345            .set_accelerate(cfg.load::<crate::config::Accelerate>().map(|ty| ty.0))
346            .set_disable_s3_express_session_auth(cfg.load::<crate::config::DisableS3ExpressSessionAuth>().map(|ty| ty.0))
347            .set_bucket(Some(
348                _input
349                    .bucket
350                    .clone()
351                    .filter(|f| !AsRef::<str>::as_ref(f).trim().is_empty())
352                    .ok_or_else(|| ::aws_smithy_types::error::operation::BuildError::missing_field("bucket", "A required field was not set"))?,
353            ))
354            .build()
355            .map_err(|err| {
356                ::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err)
357            })?;
358        cfg.interceptor_state()
359            .store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
360        ::std::result::Result::Ok(())
361    }
362}
363
364// The get_* functions below are generated from JMESPath expressions in the
365// operationContextParams trait. They target the operation's input shape.
366
367/// Error type for the `UpdateObjectEncryptionError` operation.
368#[non_exhaustive]
369#[derive(::std::fmt::Debug)]
370pub enum UpdateObjectEncryptionError {
371    /// <p>You might receive this error for several reasons. For details, see the description of this API operation.</p>
372    AccessDenied(crate::types::error::AccessDenied),
373    /// <p>A parameter or header in your request isn't valid. For details, see the description of this API operation.</p>
374    InvalidRequest(crate::types::error::InvalidRequest),
375    /// <p>The specified key does not exist.</p>
376    NoSuchKey(crate::types::error::NoSuchKey),
377    /// An unexpected error occurred (e.g., invalid JSON returned by the service or an unknown error code).
378    #[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
379    variable wildcard pattern and check `.code()`:
380     \
381    &nbsp;&nbsp;&nbsp;`err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
382     \
383    See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-UpdateObjectEncryptionError) for what information is available for the error.")]
384    Unhandled(crate::error::sealed_unhandled::Unhandled),
385}
386impl UpdateObjectEncryptionError {
387    /// Creates the `UpdateObjectEncryptionError::Unhandled` variant from any error type.
388    pub fn unhandled(
389        err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>,
390    ) -> Self {
391        Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
392            source: err.into(),
393            meta: ::std::default::Default::default(),
394        })
395    }
396
397    /// Creates the `UpdateObjectEncryptionError::Unhandled` variant from an [`ErrorMetadata`](::aws_smithy_types::error::ErrorMetadata).
398    pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
399        Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
400            source: err.clone().into(),
401            meta: err,
402        })
403    }
404    ///
405    /// Returns error metadata, which includes the error code, message,
406    /// request ID, and potentially additional information.
407    ///
408    pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
409        match self {
410            Self::AccessDenied(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
411            Self::InvalidRequest(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
412            Self::NoSuchKey(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
413            Self::Unhandled(e) => &e.meta,
414        }
415    }
416    /// Returns `true` if the error kind is `UpdateObjectEncryptionError::AccessDenied`.
417    pub fn is_access_denied(&self) -> bool {
418        matches!(self, Self::AccessDenied(_))
419    }
420    /// Returns `true` if the error kind is `UpdateObjectEncryptionError::InvalidRequest`.
421    pub fn is_invalid_request(&self) -> bool {
422        matches!(self, Self::InvalidRequest(_))
423    }
424    /// Returns `true` if the error kind is `UpdateObjectEncryptionError::NoSuchKey`.
425    pub fn is_no_such_key(&self) -> bool {
426        matches!(self, Self::NoSuchKey(_))
427    }
428}
429impl ::std::error::Error for UpdateObjectEncryptionError {
430    fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
431        match self {
432            Self::AccessDenied(_inner) => ::std::option::Option::Some(_inner),
433            Self::InvalidRequest(_inner) => ::std::option::Option::Some(_inner),
434            Self::NoSuchKey(_inner) => ::std::option::Option::Some(_inner),
435            Self::Unhandled(_inner) => ::std::option::Option::Some(&*_inner.source),
436        }
437    }
438}
439impl ::std::fmt::Display for UpdateObjectEncryptionError {
440    fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
441        match self {
442            Self::AccessDenied(_inner) => _inner.fmt(f),
443            Self::InvalidRequest(_inner) => _inner.fmt(f),
444            Self::NoSuchKey(_inner) => _inner.fmt(f),
445            Self::Unhandled(_inner) => {
446                if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
447                    write!(f, "unhandled error ({code})")
448                } else {
449                    f.write_str("unhandled error")
450                }
451            }
452        }
453    }
454}
455impl ::aws_smithy_types::retry::ProvideErrorKind for UpdateObjectEncryptionError {
456    fn code(&self) -> ::std::option::Option<&str> {
457        ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
458    }
459    fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
460        ::std::option::Option::None
461    }
462}
463impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for UpdateObjectEncryptionError {
464    fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
465        match self {
466            Self::AccessDenied(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
467            Self::InvalidRequest(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
468            Self::NoSuchKey(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
469            Self::Unhandled(_inner) => &_inner.meta,
470        }
471    }
472}
473impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for UpdateObjectEncryptionError {
474    fn create_unhandled_error(
475        source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
476        meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>,
477    ) -> Self {
478        Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
479            source,
480            meta: meta.unwrap_or_default(),
481        })
482    }
483}
484impl crate::s3_request_id::RequestIdExt for crate::operation::update_object_encryption::UpdateObjectEncryptionError {
485    fn extended_request_id(&self) -> Option<&str> {
486        self.meta().extended_request_id()
487    }
488}
489impl ::aws_types::request_id::RequestId for crate::operation::update_object_encryption::UpdateObjectEncryptionError {
490    fn request_id(&self) -> Option<&str> {
491        self.meta().request_id()
492    }
493}
494
495pub use crate::operation::update_object_encryption::_update_object_encryption_output::UpdateObjectEncryptionOutput;
496
497pub use crate::operation::update_object_encryption::_update_object_encryption_input::UpdateObjectEncryptionInput;
498
499mod _update_object_encryption_input;
500
501mod _update_object_encryption_output;
502
503/// Builders
504pub mod builders;