Struct aws_sdk_directconnect::operation::associate_mac_sec_key::builders::AssociateMacSecKeyFluentBuilder
source · pub struct AssociateMacSecKeyFluentBuilder { /* private fields */ }Expand description
Fluent builder constructing a request to AssociateMacSecKey.
Associates a MAC Security (MACsec) Connection Key Name (CKN)/ Connectivity Association Key (CAK) pair with an Direct Connect dedicated connection.
You must supply either the secretARN, or the CKN/CAK (ckn and cak) pair in the request.
For information about MAC Security (MACsec) key considerations, see MACsec pre-shared CKN/CAK key considerations in the Direct Connect User Guide.
Implementations§
source§impl AssociateMacSecKeyFluentBuilder
impl AssociateMacSecKeyFluentBuilder
sourcepub fn as_input(&self) -> &AssociateMacSecKeyInputBuilder
pub fn as_input(&self) -> &AssociateMacSecKeyInputBuilder
Access the AssociateMacSecKey as a reference.
sourcepub async fn send(
self
) -> Result<AssociateMacSecKeyOutput, SdkError<AssociateMacSecKeyError, HttpResponse>>
pub async fn send( self ) -> Result<AssociateMacSecKeyOutput, SdkError<AssociateMacSecKeyError, HttpResponse>>
Sends the request and returns the response.
If an error occurs, an SdkError will be returned with additional details that
can be matched against.
By default, any retryable failures will be retried twice. Retry behavior is configurable with the RetryConfig, which can be set when configuring the client.
sourcepub async fn customize(
self
) -> Result<CustomizableOperation<AssociateMacSecKeyOutput, AssociateMacSecKeyError>, SdkError<AssociateMacSecKeyError>>
pub async fn customize( self ) -> Result<CustomizableOperation<AssociateMacSecKeyOutput, AssociateMacSecKeyError>, SdkError<AssociateMacSecKeyError>>
Consumes this builder, creating a customizable operation that can be modified before being sent.
sourcepub fn connection_id(self, input: impl Into<String>) -> Self
pub fn connection_id(self, input: impl Into<String>) -> Self
The ID of the dedicated connection (dxcon-xxxx), or the ID of the LAG (dxlag-xxxx).
You can use DescribeConnections or DescribeLags to retrieve connection ID.
sourcepub fn set_connection_id(self, input: Option<String>) -> Self
pub fn set_connection_id(self, input: Option<String>) -> Self
The ID of the dedicated connection (dxcon-xxxx), or the ID of the LAG (dxlag-xxxx).
You can use DescribeConnections or DescribeLags to retrieve connection ID.
sourcepub fn get_connection_id(&self) -> &Option<String>
pub fn get_connection_id(&self) -> &Option<String>
The ID of the dedicated connection (dxcon-xxxx), or the ID of the LAG (dxlag-xxxx).
You can use DescribeConnections or DescribeLags to retrieve connection ID.
sourcepub fn secret_arn(self, input: impl Into<String>) -> Self
pub fn secret_arn(self, input: impl Into<String>) -> Self
The Amazon Resource Name (ARN) of the MAC Security (MACsec) secret key to associate with the dedicated connection.
You can use DescribeConnections or DescribeLags to retrieve the MAC Security (MACsec) secret key.
If you use this request parameter, you do not use the ckn and cak request parameters.
sourcepub fn set_secret_arn(self, input: Option<String>) -> Self
pub fn set_secret_arn(self, input: Option<String>) -> Self
The Amazon Resource Name (ARN) of the MAC Security (MACsec) secret key to associate with the dedicated connection.
You can use DescribeConnections or DescribeLags to retrieve the MAC Security (MACsec) secret key.
If you use this request parameter, you do not use the ckn and cak request parameters.
sourcepub fn get_secret_arn(&self) -> &Option<String>
pub fn get_secret_arn(&self) -> &Option<String>
The Amazon Resource Name (ARN) of the MAC Security (MACsec) secret key to associate with the dedicated connection.
You can use DescribeConnections or DescribeLags to retrieve the MAC Security (MACsec) secret key.
If you use this request parameter, you do not use the ckn and cak request parameters.
sourcepub fn ckn(self, input: impl Into<String>) -> Self
pub fn ckn(self, input: impl Into<String>) -> Self
The MAC Security (MACsec) CKN to associate with the dedicated connection.
You can create the CKN/CAK pair using an industry standard tool.
The valid values are 64 hexadecimal characters (0-9, A-E).
If you use this request parameter, you must use the cak request parameter and not use the secretARN request parameter.
sourcepub fn set_ckn(self, input: Option<String>) -> Self
pub fn set_ckn(self, input: Option<String>) -> Self
The MAC Security (MACsec) CKN to associate with the dedicated connection.
You can create the CKN/CAK pair using an industry standard tool.
The valid values are 64 hexadecimal characters (0-9, A-E).
If you use this request parameter, you must use the cak request parameter and not use the secretARN request parameter.
sourcepub fn get_ckn(&self) -> &Option<String>
pub fn get_ckn(&self) -> &Option<String>
The MAC Security (MACsec) CKN to associate with the dedicated connection.
You can create the CKN/CAK pair using an industry standard tool.
The valid values are 64 hexadecimal characters (0-9, A-E).
If you use this request parameter, you must use the cak request parameter and not use the secretARN request parameter.
sourcepub fn cak(self, input: impl Into<String>) -> Self
pub fn cak(self, input: impl Into<String>) -> Self
The MAC Security (MACsec) CAK to associate with the dedicated connection.
You can create the CKN/CAK pair using an industry standard tool.
The valid values are 64 hexadecimal characters (0-9, A-E).
If you use this request parameter, you must use the ckn request parameter and not use the secretARN request parameter.
sourcepub fn set_cak(self, input: Option<String>) -> Self
pub fn set_cak(self, input: Option<String>) -> Self
The MAC Security (MACsec) CAK to associate with the dedicated connection.
You can create the CKN/CAK pair using an industry standard tool.
The valid values are 64 hexadecimal characters (0-9, A-E).
If you use this request parameter, you must use the ckn request parameter and not use the secretARN request parameter.
sourcepub fn get_cak(&self) -> &Option<String>
pub fn get_cak(&self) -> &Option<String>
The MAC Security (MACsec) CAK to associate with the dedicated connection.
You can create the CKN/CAK pair using an industry standard tool.
The valid values are 64 hexadecimal characters (0-9, A-E).
If you use this request parameter, you must use the ckn request parameter and not use the secretARN request parameter.
Trait Implementations§
source§impl Clone for AssociateMacSecKeyFluentBuilder
impl Clone for AssociateMacSecKeyFluentBuilder
source§fn clone(&self) -> AssociateMacSecKeyFluentBuilder
fn clone(&self) -> AssociateMacSecKeyFluentBuilder
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more