#[non_exhaustive]pub struct KmsServerSideEncryptionIntegrationConfig {
pub kms_key_id: Option<String>,
pub opt_in_status: Option<OptInStatus>,
pub type: Option<ServerSideEncryptionType>,
}
Expand description
Information about whether DevOps Guru is configured to encrypt server-side data using KMS.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.kms_key_id: Option<String>
Describes the specified KMS key.
To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with "alias/". If you specify a predefined Amazon Web Services alias (an Amazon Web Services alias with no key ID), Amazon Web Services KMS associates the alias with an Amazon Web Services managed key and returns its KeyId and Arn in the response. To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.
For example:
Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
Alias name: alias/ExampleAlias
Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
opt_in_status: Option<OptInStatus>
Specifies if DevOps Guru is enabled for KMS integration.
type: Option<ServerSideEncryptionType>
The type of KMS key used. Customer managed keys are the KMS keys that you create. Amazon Web Services owned keys are keys that are owned and managed by DevOps Guru.
Implementations§
source§impl KmsServerSideEncryptionIntegrationConfig
impl KmsServerSideEncryptionIntegrationConfig
sourcepub fn kms_key_id(&self) -> Option<&str>
pub fn kms_key_id(&self) -> Option<&str>
Describes the specified KMS key.
To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with "alias/". If you specify a predefined Amazon Web Services alias (an Amazon Web Services alias with no key ID), Amazon Web Services KMS associates the alias with an Amazon Web Services managed key and returns its KeyId and Arn in the response. To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.
For example:
Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
Alias name: alias/ExampleAlias
Alias ARN: arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
sourcepub fn opt_in_status(&self) -> Option<&OptInStatus>
pub fn opt_in_status(&self) -> Option<&OptInStatus>
Specifies if DevOps Guru is enabled for KMS integration.
sourcepub fn type(&self) -> Option<&ServerSideEncryptionType>
pub fn type(&self) -> Option<&ServerSideEncryptionType>
The type of KMS key used. Customer managed keys are the KMS keys that you create. Amazon Web Services owned keys are keys that are owned and managed by DevOps Guru.
source§impl KmsServerSideEncryptionIntegrationConfig
impl KmsServerSideEncryptionIntegrationConfig
sourcepub fn builder() -> KmsServerSideEncryptionIntegrationConfigBuilder
pub fn builder() -> KmsServerSideEncryptionIntegrationConfigBuilder
Creates a new builder-style object to manufacture KmsServerSideEncryptionIntegrationConfig
.
Trait Implementations§
source§impl Clone for KmsServerSideEncryptionIntegrationConfig
impl Clone for KmsServerSideEncryptionIntegrationConfig
source§fn clone(&self) -> KmsServerSideEncryptionIntegrationConfig
fn clone(&self) -> KmsServerSideEncryptionIntegrationConfig
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl PartialEq for KmsServerSideEncryptionIntegrationConfig
impl PartialEq for KmsServerSideEncryptionIntegrationConfig
source§fn eq(&self, other: &KmsServerSideEncryptionIntegrationConfig) -> bool
fn eq(&self, other: &KmsServerSideEncryptionIntegrationConfig) -> bool
self
and other
values to be equal, and is used by ==
.impl StructuralPartialEq for KmsServerSideEncryptionIntegrationConfig
Auto Trait Implementations§
impl Freeze for KmsServerSideEncryptionIntegrationConfig
impl RefUnwindSafe for KmsServerSideEncryptionIntegrationConfig
impl Send for KmsServerSideEncryptionIntegrationConfig
impl Sync for KmsServerSideEncryptionIntegrationConfig
impl Unpin for KmsServerSideEncryptionIntegrationConfig
impl UnwindSafe for KmsServerSideEncryptionIntegrationConfig
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
source§default unsafe fn clone_to_uninit(&self, dst: *mut T)
default unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit
)source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more