api_op_DeactivateKeySigningKey.go (3859B)
1 // Code generated by smithy-go-codegen DO NOT EDIT. 2 3 package route53 4 5 import ( 6 "context" 7 awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware" 8 "github.com/aws/aws-sdk-go-v2/aws/signer/v4" 9 "github.com/aws/aws-sdk-go-v2/service/route53/types" 10 "github.com/aws/smithy-go/middleware" 11 smithyhttp "github.com/aws/smithy-go/transport/http" 12 ) 13 14 // Deactivates a key-signing key (KSK) so that it will not be used for signing by 15 // DNSSEC. This operation changes the KSK status to INACTIVE. 16 func (c *Client) DeactivateKeySigningKey(ctx context.Context, params *DeactivateKeySigningKeyInput, optFns ...func(*Options)) (*DeactivateKeySigningKeyOutput, error) { 17 if params == nil { 18 params = &DeactivateKeySigningKeyInput{} 19 } 20 21 result, metadata, err := c.invokeOperation(ctx, "DeactivateKeySigningKey", params, optFns, c.addOperationDeactivateKeySigningKeyMiddlewares) 22 if err != nil { 23 return nil, err 24 } 25 26 out := result.(*DeactivateKeySigningKeyOutput) 27 out.ResultMetadata = metadata 28 return out, nil 29 } 30 31 type DeactivateKeySigningKeyInput struct { 32 33 // A unique string used to identify a hosted zone. 34 // 35 // This member is required. 36 HostedZoneId *string 37 38 // A string used to identify a key-signing key (KSK). 39 // 40 // This member is required. 41 Name *string 42 43 noSmithyDocumentSerde 44 } 45 46 type DeactivateKeySigningKeyOutput struct { 47 48 // A complex type that describes change information about changes made to your 49 // hosted zone. 50 // 51 // This member is required. 52 ChangeInfo *types.ChangeInfo 53 54 // Metadata pertaining to the operation's result. 55 ResultMetadata middleware.Metadata 56 57 noSmithyDocumentSerde 58 } 59 60 func (c *Client) addOperationDeactivateKeySigningKeyMiddlewares(stack *middleware.Stack, options Options) (err error) { 61 err = stack.Serialize.Add(&awsRestxml_serializeOpDeactivateKeySigningKey{}, middleware.After) 62 if err != nil { 63 return err 64 } 65 err = stack.Deserialize.Add(&awsRestxml_deserializeOpDeactivateKeySigningKey{}, middleware.After) 66 if err != nil { 67 return err 68 } 69 if err = addSetLoggerMiddleware(stack, options); err != nil { 70 return err 71 } 72 if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil { 73 return err 74 } 75 if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil { 76 return err 77 } 78 if err = addResolveEndpointMiddleware(stack, options); err != nil { 79 return err 80 } 81 if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil { 82 return err 83 } 84 if err = addRetryMiddlewares(stack, options); err != nil { 85 return err 86 } 87 if err = addHTTPSignerV4Middleware(stack, options); err != nil { 88 return err 89 } 90 if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil { 91 return err 92 } 93 if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil { 94 return err 95 } 96 if err = addClientUserAgent(stack); err != nil { 97 return err 98 } 99 if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil { 100 return err 101 } 102 if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil { 103 return err 104 } 105 if err = addOpDeactivateKeySigningKeyValidationMiddleware(stack); err != nil { 106 return err 107 } 108 if err = stack.Initialize.Add(newServiceMetadataMiddleware_opDeactivateKeySigningKey(options.Region), middleware.Before); err != nil { 109 return err 110 } 111 if err = addRequestIDRetrieverMiddleware(stack); err != nil { 112 return err 113 } 114 if err = addResponseErrorMiddleware(stack); err != nil { 115 return err 116 } 117 if err = addSanitizeURLMiddleware(stack); err != nil { 118 return err 119 } 120 if err = addRequestResponseLogging(stack, options); err != nil { 121 return err 122 } 123 return nil 124 } 125 126 func newServiceMetadataMiddleware_opDeactivateKeySigningKey(region string) *awsmiddleware.RegisterServiceMetadata { 127 return &awsmiddleware.RegisterServiceMetadata{ 128 Region: region, 129 ServiceID: ServiceID, 130 SigningName: "route53", 131 OperationName: "DeactivateKeySigningKey", 132 } 133 }