#[non_exhaustive]pub struct CreateCertificateAuthorityInput {
pub certificate_authority_configuration: Option<CertificateAuthorityConfiguration>,
pub revocation_configuration: Option<RevocationConfiguration>,
pub certificate_authority_type: Option<CertificateAuthorityType>,
pub idempotency_token: Option<String>,
pub key_storage_security_standard: Option<KeyStorageSecurityStandard>,
pub tags: Option<Vec<Tag>>,
}
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.Name and bit size of the private key algorithm, the name of the signing algorithm, and X.500 certificate subject information.
revocation_configuration: Option<RevocationConfiguration>
Contains information to enable Online Certificate Status Protocol (OCSP) support, to enable a certificate revocation list (CRL), to enable both, or to enable neither. The default is for both certificate validation mechanisms to be disabled. For more information, see the OcspConfiguration and CrlConfiguration types.
The type of the certificate authority.
idempotency_token: Option<String>
Custom string that can be used to distinguish between calls to the CreateCertificateAuthority action. Idempotency tokens for CreateCertificateAuthority time out after five minutes. Therefore, if you call CreateCertificateAuthority multiple times with the same idempotency token within five minutes, ACM Private CA recognizes that you are requesting only certificate authority and will issue only one. If you change the idempotency token for each call, PCA recognizes that you are requesting multiple certificate authorities.
key_storage_security_standard: Option<KeyStorageSecurityStandard>
Specifies a cryptographic key management compliance standard used for handling CA keys.
Default: FIPS_140_2_LEVEL_3_OR_HIGHER
Note: FIPS_140_2_LEVEL_3_OR_HIGHER
is not supported in Region ap-northeast-3. When creating a CA in the ap-northeast-3, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER
as the argument for KeyStorageSecurityStandard
. Failure to do this results in an InvalidArgsException
with the message, "A certificate authority cannot be created in this region with the specified security standard."
Key-value pairs that will be attached to the new private CA. You can associate up to 50 tags with a private CA. For information using tags with IAM to manage permissions, see Controlling Access Using IAM Tags.
Implementations
sourceimpl CreateCertificateAuthorityInput
impl CreateCertificateAuthorityInput
sourcepub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<CreateCertificateAuthority, AwsErrorRetryPolicy>, BuildError>
pub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<CreateCertificateAuthority, AwsErrorRetryPolicy>, BuildError>
Consumes the builder and constructs an Operation<CreateCertificateAuthority
>
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture CreateCertificateAuthorityInput
sourceimpl CreateCertificateAuthorityInput
impl CreateCertificateAuthorityInput
Name and bit size of the private key algorithm, the name of the signing algorithm, and X.500 certificate subject information.
sourcepub fn revocation_configuration(&self) -> Option<&RevocationConfiguration>
pub fn revocation_configuration(&self) -> Option<&RevocationConfiguration>
Contains information to enable Online Certificate Status Protocol (OCSP) support, to enable a certificate revocation list (CRL), to enable both, or to enable neither. The default is for both certificate validation mechanisms to be disabled. For more information, see the OcspConfiguration and CrlConfiguration types.
The type of the certificate authority.
sourcepub fn idempotency_token(&self) -> Option<&str>
pub fn idempotency_token(&self) -> Option<&str>
Custom string that can be used to distinguish between calls to the CreateCertificateAuthority action. Idempotency tokens for CreateCertificateAuthority time out after five minutes. Therefore, if you call CreateCertificateAuthority multiple times with the same idempotency token within five minutes, ACM Private CA recognizes that you are requesting only certificate authority and will issue only one. If you change the idempotency token for each call, PCA recognizes that you are requesting multiple certificate authorities.
sourcepub fn key_storage_security_standard(
&self
) -> Option<&KeyStorageSecurityStandard>
pub fn key_storage_security_standard(
&self
) -> Option<&KeyStorageSecurityStandard>
Specifies a cryptographic key management compliance standard used for handling CA keys.
Default: FIPS_140_2_LEVEL_3_OR_HIGHER
Note: FIPS_140_2_LEVEL_3_OR_HIGHER
is not supported in Region ap-northeast-3. When creating a CA in the ap-northeast-3, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER
as the argument for KeyStorageSecurityStandard
. Failure to do this results in an InvalidArgsException
with the message, "A certificate authority cannot be created in this region with the specified security standard."
Key-value pairs that will be attached to the new private CA. You can associate up to 50 tags with a private CA. For information using tags with IAM to manage permissions, see Controlling Access Using IAM Tags.
Trait Implementations
sourceimpl Clone for CreateCertificateAuthorityInput
impl Clone for CreateCertificateAuthorityInput
sourcefn clone(&self) -> CreateCertificateAuthorityInput
fn clone(&self) -> CreateCertificateAuthorityInput
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
sourceimpl PartialEq<CreateCertificateAuthorityInput> for CreateCertificateAuthorityInput
impl PartialEq<CreateCertificateAuthorityInput> for CreateCertificateAuthorityInput
sourcefn eq(&self, other: &CreateCertificateAuthorityInput) -> bool
fn eq(&self, other: &CreateCertificateAuthorityInput) -> bool
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
sourcefn ne(&self, other: &CreateCertificateAuthorityInput) -> bool
fn ne(&self, other: &CreateCertificateAuthorityInput) -> bool
This method tests for !=
.
impl StructuralPartialEq for CreateCertificateAuthorityInput
Auto Trait Implementations
impl RefUnwindSafe for CreateCertificateAuthorityInput
impl Send for CreateCertificateAuthorityInput
impl Sync for CreateCertificateAuthorityInput
impl Unpin for CreateCertificateAuthorityInput
impl UnwindSafe for CreateCertificateAuthorityInput
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcefn clone_into(&self, target: &mut T)
fn clone_into(&self, target: &mut T)
toowned_clone_into
)Uses borrowed data to replace owned data, usually by cloning. Read more
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more