Struct rusoto_kms::CustomKeyStoresListEntry [−][src]
Contains information about each custom key store in the custom key store list.
Fields
cloud_hsm_cluster_id: Option<String>
A unique identifier for the AWS CloudHSM cluster that is associated with the custom key store.
connection_error_code: Option<String>
Describes the connection error. This field appears in the response only when the ConnectionState
is FAILED
. For help resolving these errors, see How to Fix a Connection Failure in AWS Key Management Service Developer Guide.
Valid values are:
-
CLUSTERNOTFOUND
- AWS KMS cannot find the AWS CloudHSM cluster with the specified cluster ID. -
INSUFFICIENTCLOUDHSMHSMS
- The associated AWS CloudHSM cluster does not contain any active HSMs. To connect a custom key store to its AWS CloudHSM cluster, the cluster must contain at least one active HSM. -
INTERNALERROR
- AWS KMS could not complete the request due to an internal error. Retry the request. ForConnectCustomKeyStore
requests, disconnect the custom key store before trying to connect again. -
INVALIDCREDENTIALS
- AWS KMS does not have the correct password for thekmsuser
crypto user in the AWS CloudHSM cluster. Before you can connect your custom key store to its AWS CloudHSM cluster, you must change thekmsuser
account password and update the key store password value for the custom key store. -
NETWORKERRORS
- Network errors are preventing AWS KMS from connecting to the custom key store. -
SUBNETNOTFOUND
- A subnet in the AWS CloudHSM cluster configuration was deleted. If AWS KMS cannot find all of the subnets in the cluster configuration, attempts to connect the custom key store to the AWS CloudHSM cluster fail. To fix this error, create a cluster from a recent backup and associate it with your custom key store. (This process creates a new cluster configuration with a VPC and private subnets.) For details, see How to Fix a Connection Failure in the AWS Key Management Service Developer Guide. -
USERLOCKEDOUT
- Thekmsuser
CU account is locked out of the associated AWS CloudHSM cluster due to too many failed password attempts. Before you can connect your custom key store to its AWS CloudHSM cluster, you must change thekmsuser
account password and update the key store password value for the custom key store. -
USERLOGGEDIN
- Thekmsuser
CU account is logged into the the associated AWS CloudHSM cluster. This prevents AWS KMS from rotating thekmsuser
account password and logging into the cluster. Before you can connect your custom key store to its AWS CloudHSM cluster, you must log thekmsuser
CU out of the cluster. If you changed thekmsuser
password to log into the cluster, you must also and update the key store password value for the custom key store. For help, see How to Log Out and Reconnect in the AWS Key Management Service Developer Guide. -
USERNOT_FOUND
- AWS KMS cannot find akmsuser
CU account in the associated AWS CloudHSM cluster. Before you can connect your custom key store to its AWS CloudHSM cluster, you must create akmsuser
CU account in the cluster, and then update the key store password value for the custom key store.
connection_state: Option<String>
Indicates whether the custom key store is connected to its AWS CloudHSM cluster.
You can create and use CMKs in your custom key stores only when its connection state is CONNECTED
.
The value is DISCONNECTED
if the key store has never been connected or you use the DisconnectCustomKeyStore operation to disconnect it. If the value is CONNECTED
but you are having trouble using the custom key store, make sure that its associated AWS CloudHSM cluster is active and contains at least one active HSM.
A value of FAILED
indicates that an attempt to connect was unsuccessful. The ConnectionErrorCode
field in the response indicates the cause of the failure. For help resolving a connection failure, see Troubleshooting a Custom Key Store in the AWS Key Management Service Developer Guide.
creation_date: Option<f64>
The date and time when the custom key store was created.
custom_key_store_id: Option<String>
A unique identifier for the custom key store.
custom_key_store_name: Option<String>
The user-specified friendly name for the custom key store.
trust_anchor_certificate: Option<String>
The trust anchor certificate of the associated AWS CloudHSM cluster. When you initialize the cluster, you create this certificate and save it in the customerCA.crt
file.
Trait Implementations
impl Clone for CustomKeyStoresListEntry
[src]
fn clone(&self) -> CustomKeyStoresListEntry
[src]
pub fn clone_from(&mut self, source: &Self)
1.0.0[src]
impl Debug for CustomKeyStoresListEntry
[src]
impl Default for CustomKeyStoresListEntry
[src]
fn default() -> CustomKeyStoresListEntry
[src]
impl<'de> Deserialize<'de> for CustomKeyStoresListEntry
[src]
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
[src]
__D: Deserializer<'de>,
impl PartialEq<CustomKeyStoresListEntry> for CustomKeyStoresListEntry
[src]
fn eq(&self, other: &CustomKeyStoresListEntry) -> bool
[src]
fn ne(&self, other: &CustomKeyStoresListEntry) -> bool
[src]
impl Serialize for CustomKeyStoresListEntry
[src]
fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error> where
__S: Serializer,
[src]
__S: Serializer,
impl StructuralPartialEq for CustomKeyStoresListEntry
[src]
Auto Trait Implementations
impl RefUnwindSafe for CustomKeyStoresListEntry
impl Send for CustomKeyStoresListEntry
impl Sync for CustomKeyStoresListEntry
impl Unpin for CustomKeyStoresListEntry
impl UnwindSafe for CustomKeyStoresListEntry
Blanket Implementations
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
pub fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> DeserializeOwned for T where
T: for<'de> Deserialize<'de>,
[src]
T: for<'de> Deserialize<'de>,
impl<T> From<T> for T
[src]
impl<T> Instrument for T
[src]
pub fn instrument(self, span: Span) -> Instrumented<Self>
[src]
pub fn in_current_span(self) -> Instrumented<Self>
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> Same<T> for T
[src]
type Output = T
Should always be Self
impl<T> Sealed<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
pub fn to_owned(&self) -> T
[src]
pub fn clone_into(&self, target: &mut T)
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
pub fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,