Struct rusoto_kms::CustomKeyStoresListEntry
source · [−]pub struct CustomKeyStoresListEntry {
pub cloud_hsm_cluster_id: Option<String>,
pub connection_error_code: Option<String>,
pub connection_state: Option<String>,
pub creation_date: Option<f64>,
pub custom_key_store_id: Option<String>,
pub custom_key_store_name: Option<String>,
pub trust_anchor_certificate: Option<String>,
}
Expand description
Contains information about each custom key store in the custom key store list.
Fields
cloud_hsm_cluster_id: Option<String>
A unique identifier for the AWS CloudHSM cluster that is associated with the custom key store.
connection_error_code: Option<String>
Describes the connection error. This field appears in the response only when the ConnectionState
is FAILED
. For help resolving these errors, see How to Fix a Connection Failure in AWS Key Management Service Developer Guide.
Valid values are:
-
CLUSTERNOTFOUND
- AWS KMS cannot find the AWS CloudHSM cluster with the specified cluster ID. -
INSUFFICIENTCLOUDHSMHSMS
- The associated AWS CloudHSM cluster does not contain any active HSMs. To connect a custom key store to its AWS CloudHSM cluster, the cluster must contain at least one active HSM. -
INTERNALERROR
- AWS KMS could not complete the request due to an internal error. Retry the request. ForConnectCustomKeyStore
requests, disconnect the custom key store before trying to connect again. -
INVALIDCREDENTIALS
- AWS KMS does not have the correct password for thekmsuser
crypto user in the AWS CloudHSM cluster. Before you can connect your custom key store to its AWS CloudHSM cluster, you must change thekmsuser
account password and update the key store password value for the custom key store. -
NETWORKERRORS
- Network errors are preventing AWS KMS from connecting to the custom key store. -
SUBNETNOTFOUND
- A subnet in the AWS CloudHSM cluster configuration was deleted. If AWS KMS cannot find all of the subnets in the cluster configuration, attempts to connect the custom key store to the AWS CloudHSM cluster fail. To fix this error, create a cluster from a recent backup and associate it with your custom key store. (This process creates a new cluster configuration with a VPC and private subnets.) For details, see How to Fix a Connection Failure in the AWS Key Management Service Developer Guide. -
USERLOCKEDOUT
- Thekmsuser
CU account is locked out of the associated AWS CloudHSM cluster due to too many failed password attempts. Before you can connect your custom key store to its AWS CloudHSM cluster, you must change thekmsuser
account password and update the key store password value for the custom key store. -
USERLOGGEDIN
- Thekmsuser
CU account is logged into the the associated AWS CloudHSM cluster. This prevents AWS KMS from rotating thekmsuser
account password and logging into the cluster. Before you can connect your custom key store to its AWS CloudHSM cluster, you must log thekmsuser
CU out of the cluster. If you changed thekmsuser
password to log into the cluster, you must also and update the key store password value for the custom key store. For help, see How to Log Out and Reconnect in the AWS Key Management Service Developer Guide. -
USERNOT_FOUND
- AWS KMS cannot find akmsuser
CU account in the associated AWS CloudHSM cluster. Before you can connect your custom key store to its AWS CloudHSM cluster, you must create akmsuser
CU account in the cluster, and then update the key store password value for the custom key store.
connection_state: Option<String>
Indicates whether the custom key store is connected to its AWS CloudHSM cluster.
You can create and use CMKs in your custom key stores only when its connection state is CONNECTED
.
The value is DISCONNECTED
if the key store has never been connected or you use the DisconnectCustomKeyStore operation to disconnect it. If the value is CONNECTED
but you are having trouble using the custom key store, make sure that its associated AWS CloudHSM cluster is active and contains at least one active HSM.
A value of FAILED
indicates that an attempt to connect was unsuccessful. The ConnectionErrorCode
field in the response indicates the cause of the failure. For help resolving a connection failure, see Troubleshooting a Custom Key Store in the AWS Key Management Service Developer Guide.
creation_date: Option<f64>
The date and time when the custom key store was created.
custom_key_store_id: Option<String>
A unique identifier for the custom key store.
custom_key_store_name: Option<String>
The user-specified friendly name for the custom key store.
trust_anchor_certificate: Option<String>
The trust anchor certificate of the associated AWS CloudHSM cluster. When you initialize the cluster, you create this certificate and save it in the customerCA.crt
file.
Trait Implementations
sourceimpl Clone for CustomKeyStoresListEntry
impl Clone for CustomKeyStoresListEntry
sourcefn clone(&self) -> CustomKeyStoresListEntry
fn clone(&self) -> CustomKeyStoresListEntry
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
sourceimpl Debug for CustomKeyStoresListEntry
impl Debug for CustomKeyStoresListEntry
sourceimpl Default for CustomKeyStoresListEntry
impl Default for CustomKeyStoresListEntry
sourcefn default() -> CustomKeyStoresListEntry
fn default() -> CustomKeyStoresListEntry
Returns the “default value” for a type. Read more
sourceimpl<'de> Deserialize<'de> for CustomKeyStoresListEntry
impl<'de> Deserialize<'de> for CustomKeyStoresListEntry
sourcefn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
Deserialize this value from the given Serde deserializer. Read more
sourceimpl PartialEq<CustomKeyStoresListEntry> for CustomKeyStoresListEntry
impl PartialEq<CustomKeyStoresListEntry> for CustomKeyStoresListEntry
sourcefn eq(&self, other: &CustomKeyStoresListEntry) -> bool
fn eq(&self, other: &CustomKeyStoresListEntry) -> bool
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
sourcefn ne(&self, other: &CustomKeyStoresListEntry) -> bool
fn ne(&self, other: &CustomKeyStoresListEntry) -> bool
This method tests for !=
.
impl StructuralPartialEq for CustomKeyStoresListEntry
Auto Trait Implementations
impl RefUnwindSafe for CustomKeyStoresListEntry
impl Send for CustomKeyStoresListEntry
impl Sync for CustomKeyStoresListEntry
impl Unpin for CustomKeyStoresListEntry
impl UnwindSafe for CustomKeyStoresListEntry
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcefn clone_into(&self, target: &mut T)
fn clone_into(&self, target: &mut T)
toowned_clone_into
)Uses borrowed data to replace owned data, usually by cloning. Read more
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more