aws_sdk_cloudhsmv2/operation/initialize_cluster/
builders.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2pub use crate::operation::initialize_cluster::_initialize_cluster_output::InitializeClusterOutputBuilder;
3
4pub use crate::operation::initialize_cluster::_initialize_cluster_input::InitializeClusterInputBuilder;
5
6impl crate::operation::initialize_cluster::builders::InitializeClusterInputBuilder {
7    /// Sends a request with this input using the given client.
8    pub async fn send_with(
9        self,
10        client: &crate::Client,
11    ) -> ::std::result::Result<
12        crate::operation::initialize_cluster::InitializeClusterOutput,
13        ::aws_smithy_runtime_api::client::result::SdkError<
14            crate::operation::initialize_cluster::InitializeClusterError,
15            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
16        >,
17    > {
18        let mut fluent_builder = client.initialize_cluster();
19        fluent_builder.inner = self;
20        fluent_builder.send().await
21    }
22}
23/// Fluent builder constructing a request to `InitializeCluster`.
24///
25/// <p>Claims an CloudHSM cluster by submitting the cluster certificate issued by your issuing certificate authority (CA) and the CA's root certificate. Before you can claim a cluster, you must sign the cluster's certificate signing request (CSR) with your issuing CA. To get the cluster's CSR, use <code>DescribeClusters</code>.</p>
26/// <p><b>Cross-account use:</b> No. You cannot perform this operation on an CloudHSM cluster in a different Amazon Web Services account.</p>
27#[derive(::std::clone::Clone, ::std::fmt::Debug)]
28pub struct InitializeClusterFluentBuilder {
29    handle: ::std::sync::Arc<crate::client::Handle>,
30    inner: crate::operation::initialize_cluster::builders::InitializeClusterInputBuilder,
31    config_override: ::std::option::Option<crate::config::Builder>,
32}
33impl
34    crate::client::customize::internal::CustomizableSend<
35        crate::operation::initialize_cluster::InitializeClusterOutput,
36        crate::operation::initialize_cluster::InitializeClusterError,
37    > for InitializeClusterFluentBuilder
38{
39    fn send(
40        self,
41        config_override: crate::config::Builder,
42    ) -> crate::client::customize::internal::BoxFuture<
43        crate::client::customize::internal::SendResult<
44            crate::operation::initialize_cluster::InitializeClusterOutput,
45            crate::operation::initialize_cluster::InitializeClusterError,
46        >,
47    > {
48        ::std::boxed::Box::pin(async move { self.config_override(config_override).send().await })
49    }
50}
51impl InitializeClusterFluentBuilder {
52    /// Creates a new `InitializeClusterFluentBuilder`.
53    pub(crate) fn new(handle: ::std::sync::Arc<crate::client::Handle>) -> Self {
54        Self {
55            handle,
56            inner: ::std::default::Default::default(),
57            config_override: ::std::option::Option::None,
58        }
59    }
60    /// Access the InitializeCluster as a reference.
61    pub fn as_input(&self) -> &crate::operation::initialize_cluster::builders::InitializeClusterInputBuilder {
62        &self.inner
63    }
64    /// Sends the request and returns the response.
65    ///
66    /// If an error occurs, an `SdkError` will be returned with additional details that
67    /// can be matched against.
68    ///
69    /// By default, any retryable failures will be retried twice. Retry behavior
70    /// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
71    /// set when configuring the client.
72    pub async fn send(
73        self,
74    ) -> ::std::result::Result<
75        crate::operation::initialize_cluster::InitializeClusterOutput,
76        ::aws_smithy_runtime_api::client::result::SdkError<
77            crate::operation::initialize_cluster::InitializeClusterError,
78            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
79        >,
80    > {
81        let input = self
82            .inner
83            .build()
84            .map_err(::aws_smithy_runtime_api::client::result::SdkError::construction_failure)?;
85        let runtime_plugins = crate::operation::initialize_cluster::InitializeCluster::operation_runtime_plugins(
86            self.handle.runtime_plugins.clone(),
87            &self.handle.conf,
88            self.config_override,
89        );
90        crate::operation::initialize_cluster::InitializeCluster::orchestrate(&runtime_plugins, input).await
91    }
92
93    /// Consumes this builder, creating a customizable operation that can be modified before being sent.
94    pub fn customize(
95        self,
96    ) -> crate::client::customize::CustomizableOperation<
97        crate::operation::initialize_cluster::InitializeClusterOutput,
98        crate::operation::initialize_cluster::InitializeClusterError,
99        Self,
100    > {
101        crate::client::customize::CustomizableOperation::new(self)
102    }
103    pub(crate) fn config_override(mut self, config_override: impl ::std::convert::Into<crate::config::Builder>) -> Self {
104        self.set_config_override(::std::option::Option::Some(config_override.into()));
105        self
106    }
107
108    pub(crate) fn set_config_override(&mut self, config_override: ::std::option::Option<crate::config::Builder>) -> &mut Self {
109        self.config_override = config_override;
110        self
111    }
112    /// <p>The identifier (ID) of the cluster that you are claiming. To find the cluster ID, use <code>DescribeClusters</code>.</p>
113    pub fn cluster_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
114        self.inner = self.inner.cluster_id(input.into());
115        self
116    }
117    /// <p>The identifier (ID) of the cluster that you are claiming. To find the cluster ID, use <code>DescribeClusters</code>.</p>
118    pub fn set_cluster_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
119        self.inner = self.inner.set_cluster_id(input);
120        self
121    }
122    /// <p>The identifier (ID) of the cluster that you are claiming. To find the cluster ID, use <code>DescribeClusters</code>.</p>
123    pub fn get_cluster_id(&self) -> &::std::option::Option<::std::string::String> {
124        self.inner.get_cluster_id()
125    }
126    /// <p>The cluster certificate issued (signed) by your issuing certificate authority (CA). The certificate must be in PEM format and can contain a maximum of 5000 characters.</p>
127    pub fn signed_cert(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
128        self.inner = self.inner.signed_cert(input.into());
129        self
130    }
131    /// <p>The cluster certificate issued (signed) by your issuing certificate authority (CA). The certificate must be in PEM format and can contain a maximum of 5000 characters.</p>
132    pub fn set_signed_cert(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
133        self.inner = self.inner.set_signed_cert(input);
134        self
135    }
136    /// <p>The cluster certificate issued (signed) by your issuing certificate authority (CA). The certificate must be in PEM format and can contain a maximum of 5000 characters.</p>
137    pub fn get_signed_cert(&self) -> &::std::option::Option<::std::string::String> {
138        self.inner.get_signed_cert()
139    }
140    /// <p>The issuing certificate of the issuing certificate authority (CA) that issued (signed) the cluster certificate. You must use a self-signed certificate. The certificate used to sign the HSM CSR must be directly available, and thus must be the root certificate. The certificate must be in PEM format and can contain a maximum of 5000 characters.</p>
141    pub fn trust_anchor(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
142        self.inner = self.inner.trust_anchor(input.into());
143        self
144    }
145    /// <p>The issuing certificate of the issuing certificate authority (CA) that issued (signed) the cluster certificate. You must use a self-signed certificate. The certificate used to sign the HSM CSR must be directly available, and thus must be the root certificate. The certificate must be in PEM format and can contain a maximum of 5000 characters.</p>
146    pub fn set_trust_anchor(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
147        self.inner = self.inner.set_trust_anchor(input);
148        self
149    }
150    /// <p>The issuing certificate of the issuing certificate authority (CA) that issued (signed) the cluster certificate. You must use a self-signed certificate. The certificate used to sign the HSM CSR must be directly available, and thus must be the root certificate. The certificate must be in PEM format and can contain a maximum of 5000 characters.</p>
151    pub fn get_trust_anchor(&self) -> &::std::option::Option<::std::string::String> {
152        self.inner.get_trust_anchor()
153    }
154}