#[non_exhaustive]
pub struct CertificateSummaryBuilder { /* private fields */ }
Expand description

A builder for CertificateSummary.

Implementations§

source§

impl CertificateSummaryBuilder

source

pub fn certificate_arn(self, input: impl Into<String>) -> Self

Amazon Resource Name (ARN) of the certificate. This is of the form:

arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012

For more information about ARNs, see Amazon Resource Names (ARNs).

source

pub fn set_certificate_arn(self, input: Option<String>) -> Self

Amazon Resource Name (ARN) of the certificate. This is of the form:

arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012

For more information about ARNs, see Amazon Resource Names (ARNs).

source

pub fn get_certificate_arn(&self) -> &Option<String>

Amazon Resource Name (ARN) of the certificate. This is of the form:

arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012

For more information about ARNs, see Amazon Resource Names (ARNs).

source

pub fn domain_name(self, input: impl Into<String>) -> Self

Fully qualified domain name (FQDN), such as www.example.com or example.com, for the certificate.

source

pub fn set_domain_name(self, input: Option<String>) -> Self

Fully qualified domain name (FQDN), such as www.example.com or example.com, for the certificate.

source

pub fn get_domain_name(&self) -> &Option<String>

Fully qualified domain name (FQDN), such as www.example.com or example.com, for the certificate.

source

pub fn subject_alternative_name_summaries( self, input: impl Into<String> ) -> Self

Appends an item to subject_alternative_name_summaries.

To override the contents of this collection use set_subject_alternative_name_summaries.

One or more domain names (subject alternative names) included in the certificate. This list contains the domain names that are bound to the public key that is contained in the certificate. The subject alternative names include the canonical domain name (CN) of the certificate and additional domain names that can be used to connect to the website.

When called by ListCertificates, this parameter will only return the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use DescribeCertificate.

source

pub fn set_subject_alternative_name_summaries( self, input: Option<Vec<String>> ) -> Self

One or more domain names (subject alternative names) included in the certificate. This list contains the domain names that are bound to the public key that is contained in the certificate. The subject alternative names include the canonical domain name (CN) of the certificate and additional domain names that can be used to connect to the website.

When called by ListCertificates, this parameter will only return the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use DescribeCertificate.

source

pub fn get_subject_alternative_name_summaries(&self) -> &Option<Vec<String>>

One or more domain names (subject alternative names) included in the certificate. This list contains the domain names that are bound to the public key that is contained in the certificate. The subject alternative names include the canonical domain name (CN) of the certificate and additional domain names that can be used to connect to the website.

When called by ListCertificates, this parameter will only return the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use DescribeCertificate.

source

pub fn has_additional_subject_alternative_names(self, input: bool) -> Self

When called by ListCertificates, indicates whether the full list of subject alternative names has been included in the response. If false, the response includes all of the subject alternative names included in the certificate. If true, the response only includes the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use DescribeCertificate.

source

pub fn set_has_additional_subject_alternative_names( self, input: Option<bool> ) -> Self

When called by ListCertificates, indicates whether the full list of subject alternative names has been included in the response. If false, the response includes all of the subject alternative names included in the certificate. If true, the response only includes the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use DescribeCertificate.

source

pub fn get_has_additional_subject_alternative_names(&self) -> &Option<bool>

When called by ListCertificates, indicates whether the full list of subject alternative names has been included in the response. If false, the response includes all of the subject alternative names included in the certificate. If true, the response only includes the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use DescribeCertificate.

source

pub fn status(self, input: CertificateStatus) -> Self

The status of the certificate.

A certificate enters status PENDING_VALIDATION upon being requested, unless it fails for any of the reasons given in the troubleshooting topic Certificate request fails. ACM makes repeated attempts to validate a certificate for 72 hours and then times out. If a certificate shows status FAILED or VALIDATION_TIMED_OUT, delete the request, correct the issue with DNS validation or Email validation, and try again. If validation succeeds, the certificate enters status ISSUED.

source

pub fn set_status(self, input: Option<CertificateStatus>) -> Self

The status of the certificate.

A certificate enters status PENDING_VALIDATION upon being requested, unless it fails for any of the reasons given in the troubleshooting topic Certificate request fails. ACM makes repeated attempts to validate a certificate for 72 hours and then times out. If a certificate shows status FAILED or VALIDATION_TIMED_OUT, delete the request, correct the issue with DNS validation or Email validation, and try again. If validation succeeds, the certificate enters status ISSUED.

source

pub fn get_status(&self) -> &Option<CertificateStatus>

The status of the certificate.

A certificate enters status PENDING_VALIDATION upon being requested, unless it fails for any of the reasons given in the troubleshooting topic Certificate request fails. ACM makes repeated attempts to validate a certificate for 72 hours and then times out. If a certificate shows status FAILED or VALIDATION_TIMED_OUT, delete the request, correct the issue with DNS validation or Email validation, and try again. If validation succeeds, the certificate enters status ISSUED.

source

pub fn type(self, input: CertificateType) -> Self

The source of the certificate. For certificates provided by ACM, this value is AMAZON_ISSUED. For certificates that you imported with ImportCertificate, this value is IMPORTED. ACM does not provide managed renewal for imported certificates. For more information about the differences between certificates that you import and those that ACM provides, see Importing Certificates in the Certificate Manager User Guide.

source

pub fn set_type(self, input: Option<CertificateType>) -> Self

The source of the certificate. For certificates provided by ACM, this value is AMAZON_ISSUED. For certificates that you imported with ImportCertificate, this value is IMPORTED. ACM does not provide managed renewal for imported certificates. For more information about the differences between certificates that you import and those that ACM provides, see Importing Certificates in the Certificate Manager User Guide.

source

pub fn get_type(&self) -> &Option<CertificateType>

The source of the certificate. For certificates provided by ACM, this value is AMAZON_ISSUED. For certificates that you imported with ImportCertificate, this value is IMPORTED. ACM does not provide managed renewal for imported certificates. For more information about the differences between certificates that you import and those that ACM provides, see Importing Certificates in the Certificate Manager User Guide.

source

pub fn key_algorithm(self, input: KeyAlgorithm) -> Self

The algorithm that was used to generate the public-private key pair.

source

pub fn set_key_algorithm(self, input: Option<KeyAlgorithm>) -> Self

The algorithm that was used to generate the public-private key pair.

source

pub fn get_key_algorithm(&self) -> &Option<KeyAlgorithm>

The algorithm that was used to generate the public-private key pair.

source

pub fn key_usages(self, input: KeyUsageName) -> Self

Appends an item to key_usages.

To override the contents of this collection use set_key_usages.

A list of Key Usage X.509 v3 extension objects. Each object is a string value that identifies the purpose of the public key contained in the certificate. Possible extension values include DIGITAL_SIGNATURE, KEY_ENCHIPHERMENT, NON_REPUDIATION, and more.

source

pub fn set_key_usages(self, input: Option<Vec<KeyUsageName>>) -> Self

A list of Key Usage X.509 v3 extension objects. Each object is a string value that identifies the purpose of the public key contained in the certificate. Possible extension values include DIGITAL_SIGNATURE, KEY_ENCHIPHERMENT, NON_REPUDIATION, and more.

source

pub fn get_key_usages(&self) -> &Option<Vec<KeyUsageName>>

A list of Key Usage X.509 v3 extension objects. Each object is a string value that identifies the purpose of the public key contained in the certificate. Possible extension values include DIGITAL_SIGNATURE, KEY_ENCHIPHERMENT, NON_REPUDIATION, and more.

source

pub fn extended_key_usages(self, input: ExtendedKeyUsageName) -> Self

Appends an item to extended_key_usages.

To override the contents of this collection use set_extended_key_usages.

Contains a list of Extended Key Usage X.509 v3 extension objects. Each object specifies a purpose for which the certificate public key can be used and consists of a name and an object identifier (OID).

source

pub fn set_extended_key_usages( self, input: Option<Vec<ExtendedKeyUsageName>> ) -> Self

Contains a list of Extended Key Usage X.509 v3 extension objects. Each object specifies a purpose for which the certificate public key can be used and consists of a name and an object identifier (OID).

source

pub fn get_extended_key_usages(&self) -> &Option<Vec<ExtendedKeyUsageName>>

Contains a list of Extended Key Usage X.509 v3 extension objects. Each object specifies a purpose for which the certificate public key can be used and consists of a name and an object identifier (OID).

source

pub fn in_use(self, input: bool) -> Self

Indicates whether the certificate is currently in use by any Amazon Web Services resources.

source

pub fn set_in_use(self, input: Option<bool>) -> Self

Indicates whether the certificate is currently in use by any Amazon Web Services resources.

source

pub fn get_in_use(&self) -> &Option<bool>

Indicates whether the certificate is currently in use by any Amazon Web Services resources.

source

pub fn exported(self, input: bool) -> Self

Indicates whether the certificate has been exported. This value exists only when the certificate type is PRIVATE.

source

pub fn set_exported(self, input: Option<bool>) -> Self

Indicates whether the certificate has been exported. This value exists only when the certificate type is PRIVATE.

source

pub fn get_exported(&self) -> &Option<bool>

Indicates whether the certificate has been exported. This value exists only when the certificate type is PRIVATE.

source

pub fn renewal_eligibility(self, input: RenewalEligibility) -> Self

Specifies whether the certificate is eligible for renewal. At this time, only exported private certificates can be renewed with the RenewCertificate command.

source

pub fn set_renewal_eligibility(self, input: Option<RenewalEligibility>) -> Self

Specifies whether the certificate is eligible for renewal. At this time, only exported private certificates can be renewed with the RenewCertificate command.

source

pub fn get_renewal_eligibility(&self) -> &Option<RenewalEligibility>

Specifies whether the certificate is eligible for renewal. At this time, only exported private certificates can be renewed with the RenewCertificate command.

source

pub fn not_before(self, input: DateTime) -> Self

The time before which the certificate is not valid.

source

pub fn set_not_before(self, input: Option<DateTime>) -> Self

The time before which the certificate is not valid.

source

pub fn get_not_before(&self) -> &Option<DateTime>

The time before which the certificate is not valid.

source

pub fn not_after(self, input: DateTime) -> Self

The time after which the certificate is not valid.

source

pub fn set_not_after(self, input: Option<DateTime>) -> Self

The time after which the certificate is not valid.

source

pub fn get_not_after(&self) -> &Option<DateTime>

The time after which the certificate is not valid.

source

pub fn created_at(self, input: DateTime) -> Self

The time at which the certificate was requested.

source

pub fn set_created_at(self, input: Option<DateTime>) -> Self

The time at which the certificate was requested.

source

pub fn get_created_at(&self) -> &Option<DateTime>

The time at which the certificate was requested.

source

pub fn issued_at(self, input: DateTime) -> Self

The time at which the certificate was issued. This value exists only when the certificate type is AMAZON_ISSUED.

source

pub fn set_issued_at(self, input: Option<DateTime>) -> Self

The time at which the certificate was issued. This value exists only when the certificate type is AMAZON_ISSUED.

source

pub fn get_issued_at(&self) -> &Option<DateTime>

The time at which the certificate was issued. This value exists only when the certificate type is AMAZON_ISSUED.

source

pub fn imported_at(self, input: DateTime) -> Self

The date and time when the certificate was imported. This value exists only when the certificate type is IMPORTED.

source

pub fn set_imported_at(self, input: Option<DateTime>) -> Self

The date and time when the certificate was imported. This value exists only when the certificate type is IMPORTED.

source

pub fn get_imported_at(&self) -> &Option<DateTime>

The date and time when the certificate was imported. This value exists only when the certificate type is IMPORTED.

source

pub fn revoked_at(self, input: DateTime) -> Self

The time at which the certificate was revoked. This value exists only when the certificate status is REVOKED.

source

pub fn set_revoked_at(self, input: Option<DateTime>) -> Self

The time at which the certificate was revoked. This value exists only when the certificate status is REVOKED.

source

pub fn get_revoked_at(&self) -> &Option<DateTime>

The time at which the certificate was revoked. This value exists only when the certificate status is REVOKED.

source

pub fn build(self) -> CertificateSummary

Consumes the builder and constructs a CertificateSummary.

Trait Implementations§

source§

impl Clone for CertificateSummaryBuilder

source§

fn clone(&self) -> CertificateSummaryBuilder

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
source§

impl Debug for CertificateSummaryBuilder

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
source§

impl Default for CertificateSummaryBuilder

source§

fn default() -> CertificateSummaryBuilder

Returns the “default value” for a type. Read more
source§

impl PartialEq for CertificateSummaryBuilder

source§

fn eq(&self, other: &CertificateSummaryBuilder) -> bool

This method tests for self and other values to be equal, and is used by ==.
1.0.0 · source§

fn ne(&self, other: &Rhs) -> bool

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
source§

impl StructuralPartialEq for CertificateSummaryBuilder

Auto Trait Implementations§

Blanket Implementations§

source§

impl<T> Any for T
where T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for T
where T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

source§

impl<T> Instrument for T

source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
source§

impl<T, U> Into<U> for T
where U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<Unshared, Shared> IntoShared<Shared> for Unshared
where Shared: FromUnshared<Unshared>,

source§

fn into_shared(self) -> Shared

Creates a shared type from an unshared type.
source§

impl<T> Same for T

§

type Output = T

Should always be Self
source§

impl<T> ToOwned for T
where T: Clone,

§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
source§

impl<T> WithSubscriber for T

source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more