src

Go monorepo.
git clone git://code.dwrz.net/src
Log | Files | Refs

api_op_DeactivateKeySigningKey.go (4223B)


      1 // Code generated by smithy-go-codegen DO NOT EDIT.
      2 
      3 package route53
      4 
      5 import (
      6 	"context"
      7 	"fmt"
      8 	awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
      9 	"github.com/aws/aws-sdk-go-v2/service/route53/types"
     10 	"github.com/aws/smithy-go/middleware"
     11 	smithyhttp "github.com/aws/smithy-go/transport/http"
     12 )
     13 
     14 // Deactivates a key-signing key (KSK) so that it will not be used for signing by
     15 // DNSSEC. This operation changes the KSK status to INACTIVE .
     16 func (c *Client) DeactivateKeySigningKey(ctx context.Context, params *DeactivateKeySigningKeyInput, optFns ...func(*Options)) (*DeactivateKeySigningKeyOutput, error) {
     17 	if params == nil {
     18 		params = &DeactivateKeySigningKeyInput{}
     19 	}
     20 
     21 	result, metadata, err := c.invokeOperation(ctx, "DeactivateKeySigningKey", params, optFns, c.addOperationDeactivateKeySigningKeyMiddlewares)
     22 	if err != nil {
     23 		return nil, err
     24 	}
     25 
     26 	out := result.(*DeactivateKeySigningKeyOutput)
     27 	out.ResultMetadata = metadata
     28 	return out, nil
     29 }
     30 
     31 type DeactivateKeySigningKeyInput struct {
     32 
     33 	// A unique string used to identify a hosted zone.
     34 	//
     35 	// This member is required.
     36 	HostedZoneId *string
     37 
     38 	// A string used to identify a key-signing key (KSK).
     39 	//
     40 	// This member is required.
     41 	Name *string
     42 
     43 	noSmithyDocumentSerde
     44 }
     45 
     46 type DeactivateKeySigningKeyOutput struct {
     47 
     48 	// A complex type that describes change information about changes made to your
     49 	// hosted zone.
     50 	//
     51 	// This member is required.
     52 	ChangeInfo *types.ChangeInfo
     53 
     54 	// Metadata pertaining to the operation's result.
     55 	ResultMetadata middleware.Metadata
     56 
     57 	noSmithyDocumentSerde
     58 }
     59 
     60 func (c *Client) addOperationDeactivateKeySigningKeyMiddlewares(stack *middleware.Stack, options Options) (err error) {
     61 	if err := stack.Serialize.Add(&setOperationInputMiddleware{}, middleware.After); err != nil {
     62 		return err
     63 	}
     64 	err = stack.Serialize.Add(&awsRestxml_serializeOpDeactivateKeySigningKey{}, middleware.After)
     65 	if err != nil {
     66 		return err
     67 	}
     68 	err = stack.Deserialize.Add(&awsRestxml_deserializeOpDeactivateKeySigningKey{}, middleware.After)
     69 	if err != nil {
     70 		return err
     71 	}
     72 	if err := addProtocolFinalizerMiddlewares(stack, options, "DeactivateKeySigningKey"); err != nil {
     73 		return fmt.Errorf("add protocol finalizers: %v", err)
     74 	}
     75 
     76 	if err = addlegacyEndpointContextSetter(stack, options); err != nil {
     77 		return err
     78 	}
     79 	if err = addSetLoggerMiddleware(stack, options); err != nil {
     80 		return err
     81 	}
     82 	if err = addClientRequestID(stack); err != nil {
     83 		return err
     84 	}
     85 	if err = addComputeContentLength(stack); err != nil {
     86 		return err
     87 	}
     88 	if err = addResolveEndpointMiddleware(stack, options); err != nil {
     89 		return err
     90 	}
     91 	if err = addComputePayloadSHA256(stack); err != nil {
     92 		return err
     93 	}
     94 	if err = addRetry(stack, options); err != nil {
     95 		return err
     96 	}
     97 	if err = addRawResponseToMetadata(stack); err != nil {
     98 		return err
     99 	}
    100 	if err = addRecordResponseTiming(stack); err != nil {
    101 		return err
    102 	}
    103 	if err = addClientUserAgent(stack, options); err != nil {
    104 		return err
    105 	}
    106 	if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
    107 		return err
    108 	}
    109 	if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
    110 		return err
    111 	}
    112 	if err = addSetLegacyContextSigningOptionsMiddleware(stack); err != nil {
    113 		return err
    114 	}
    115 	if err = addOpDeactivateKeySigningKeyValidationMiddleware(stack); err != nil {
    116 		return err
    117 	}
    118 	if err = stack.Initialize.Add(newServiceMetadataMiddleware_opDeactivateKeySigningKey(options.Region), middleware.Before); err != nil {
    119 		return err
    120 	}
    121 	if err = addRecursionDetection(stack); err != nil {
    122 		return err
    123 	}
    124 	if err = addRequestIDRetrieverMiddleware(stack); err != nil {
    125 		return err
    126 	}
    127 	if err = addResponseErrorMiddleware(stack); err != nil {
    128 		return err
    129 	}
    130 	if err = addSanitizeURLMiddleware(stack); err != nil {
    131 		return err
    132 	}
    133 	if err = addRequestResponseLogging(stack, options); err != nil {
    134 		return err
    135 	}
    136 	if err = addDisableHTTPSMiddleware(stack, options); err != nil {
    137 		return err
    138 	}
    139 	return nil
    140 }
    141 
    142 func newServiceMetadataMiddleware_opDeactivateKeySigningKey(region string) *awsmiddleware.RegisterServiceMetadata {
    143 	return &awsmiddleware.RegisterServiceMetadata{
    144 		Region:        region,
    145 		ServiceID:     ServiceID,
    146 		OperationName: "DeactivateKeySigningKey",
    147 	}
    148 }