src

Go monorepo.
git clone git://code.dwrz.net/src
Log | Files | Refs

api_op_DeleteKeySigningKey.go (6007B)


      1 // Code generated by smithy-go-codegen DO NOT EDIT.
      2 
      3 package route53
      4 
      5 import (
      6 	"context"
      7 	"fmt"
      8 	awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
      9 	"github.com/aws/aws-sdk-go-v2/service/route53/types"
     10 	"github.com/aws/smithy-go/middleware"
     11 	smithyhttp "github.com/aws/smithy-go/transport/http"
     12 )
     13 
     14 // Deletes a key-signing key (KSK). Before you can delete a KSK, you must
     15 // deactivate it. The KSK must be deactivated before you can delete it regardless
     16 // of whether the hosted zone is enabled for DNSSEC signing.
     17 //
     18 // You can use [DeactivateKeySigningKey] to deactivate the key before you delete it.
     19 //
     20 // Use [GetDNSSEC] to verify that the KSK is in an INACTIVE status.
     21 //
     22 // [DeactivateKeySigningKey]: https://docs.aws.amazon.com/Route53/latest/APIReference/API_DeactivateKeySigningKey.html
     23 // [GetDNSSEC]: https://docs.aws.amazon.com/Route53/latest/APIReference/API_GetDNSSEC.html
     24 func (c *Client) DeleteKeySigningKey(ctx context.Context, params *DeleteKeySigningKeyInput, optFns ...func(*Options)) (*DeleteKeySigningKeyOutput, error) {
     25 	if params == nil {
     26 		params = &DeleteKeySigningKeyInput{}
     27 	}
     28 
     29 	result, metadata, err := c.invokeOperation(ctx, "DeleteKeySigningKey", params, optFns, c.addOperationDeleteKeySigningKeyMiddlewares)
     30 	if err != nil {
     31 		return nil, err
     32 	}
     33 
     34 	out := result.(*DeleteKeySigningKeyOutput)
     35 	out.ResultMetadata = metadata
     36 	return out, nil
     37 }
     38 
     39 type DeleteKeySigningKeyInput struct {
     40 
     41 	// A unique string used to identify a hosted zone.
     42 	//
     43 	// This member is required.
     44 	HostedZoneId *string
     45 
     46 	// A string used to identify a key-signing key (KSK).
     47 	//
     48 	// This member is required.
     49 	Name *string
     50 
     51 	noSmithyDocumentSerde
     52 }
     53 
     54 type DeleteKeySigningKeyOutput struct {
     55 
     56 	// A complex type that describes change information about changes made to your
     57 	// hosted zone.
     58 	//
     59 	// This member is required.
     60 	ChangeInfo *types.ChangeInfo
     61 
     62 	// Metadata pertaining to the operation's result.
     63 	ResultMetadata middleware.Metadata
     64 
     65 	noSmithyDocumentSerde
     66 }
     67 
     68 func (c *Client) addOperationDeleteKeySigningKeyMiddlewares(stack *middleware.Stack, options Options) (err error) {
     69 	if err := stack.Serialize.Add(&setOperationInputMiddleware{}, middleware.After); err != nil {
     70 		return err
     71 	}
     72 	err = stack.Serialize.Add(&awsRestxml_serializeOpDeleteKeySigningKey{}, middleware.After)
     73 	if err != nil {
     74 		return err
     75 	}
     76 	err = stack.Deserialize.Add(&awsRestxml_deserializeOpDeleteKeySigningKey{}, middleware.After)
     77 	if err != nil {
     78 		return err
     79 	}
     80 	if err := addProtocolFinalizerMiddlewares(stack, options, "DeleteKeySigningKey"); err != nil {
     81 		return fmt.Errorf("add protocol finalizers: %v", err)
     82 	}
     83 
     84 	if err = addlegacyEndpointContextSetter(stack, options); err != nil {
     85 		return err
     86 	}
     87 	if err = addSetLoggerMiddleware(stack, options); err != nil {
     88 		return err
     89 	}
     90 	if err = addClientRequestID(stack); err != nil {
     91 		return err
     92 	}
     93 	if err = addComputeContentLength(stack); err != nil {
     94 		return err
     95 	}
     96 	if err = addResolveEndpointMiddleware(stack, options); err != nil {
     97 		return err
     98 	}
     99 	if err = addComputePayloadSHA256(stack); err != nil {
    100 		return err
    101 	}
    102 	if err = addRetry(stack, options); err != nil {
    103 		return err
    104 	}
    105 	if err = addRawResponseToMetadata(stack); err != nil {
    106 		return err
    107 	}
    108 	if err = addRecordResponseTiming(stack); err != nil {
    109 		return err
    110 	}
    111 	if err = addSpanRetryLoop(stack, options); err != nil {
    112 		return err
    113 	}
    114 	if err = addClientUserAgent(stack, options); err != nil {
    115 		return err
    116 	}
    117 	if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
    118 		return err
    119 	}
    120 	if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
    121 		return err
    122 	}
    123 	if err = addSetLegacyContextSigningOptionsMiddleware(stack); err != nil {
    124 		return err
    125 	}
    126 	if err = addTimeOffsetBuild(stack, c); err != nil {
    127 		return err
    128 	}
    129 	if err = addUserAgentRetryMode(stack, options); err != nil {
    130 		return err
    131 	}
    132 	if err = addCredentialSource(stack, options); err != nil {
    133 		return err
    134 	}
    135 	if err = addOpDeleteKeySigningKeyValidationMiddleware(stack); err != nil {
    136 		return err
    137 	}
    138 	if err = stack.Initialize.Add(newServiceMetadataMiddleware_opDeleteKeySigningKey(options.Region), middleware.Before); err != nil {
    139 		return err
    140 	}
    141 	if err = addRecursionDetection(stack); err != nil {
    142 		return err
    143 	}
    144 	if err = addRequestIDRetrieverMiddleware(stack); err != nil {
    145 		return err
    146 	}
    147 	if err = addResponseErrorMiddleware(stack); err != nil {
    148 		return err
    149 	}
    150 	if err = addSanitizeURLMiddleware(stack); err != nil {
    151 		return err
    152 	}
    153 	if err = addRequestResponseLogging(stack, options); err != nil {
    154 		return err
    155 	}
    156 	if err = addDisableHTTPSMiddleware(stack, options); err != nil {
    157 		return err
    158 	}
    159 	if err = addInterceptBeforeRetryLoop(stack, options); err != nil {
    160 		return err
    161 	}
    162 	if err = addInterceptAttempt(stack, options); err != nil {
    163 		return err
    164 	}
    165 	if err = addInterceptExecution(stack, options); err != nil {
    166 		return err
    167 	}
    168 	if err = addInterceptBeforeSerialization(stack, options); err != nil {
    169 		return err
    170 	}
    171 	if err = addInterceptAfterSerialization(stack, options); err != nil {
    172 		return err
    173 	}
    174 	if err = addInterceptBeforeSigning(stack, options); err != nil {
    175 		return err
    176 	}
    177 	if err = addInterceptAfterSigning(stack, options); err != nil {
    178 		return err
    179 	}
    180 	if err = addInterceptTransmit(stack, options); err != nil {
    181 		return err
    182 	}
    183 	if err = addInterceptBeforeDeserialization(stack, options); err != nil {
    184 		return err
    185 	}
    186 	if err = addInterceptAfterDeserialization(stack, options); err != nil {
    187 		return err
    188 	}
    189 	if err = addSpanInitializeStart(stack); err != nil {
    190 		return err
    191 	}
    192 	if err = addSpanInitializeEnd(stack); err != nil {
    193 		return err
    194 	}
    195 	if err = addSpanBuildRequestStart(stack); err != nil {
    196 		return err
    197 	}
    198 	if err = addSpanBuildRequestEnd(stack); err != nil {
    199 		return err
    200 	}
    201 	return nil
    202 }
    203 
    204 func newServiceMetadataMiddleware_opDeleteKeySigningKey(region string) *awsmiddleware.RegisterServiceMetadata {
    205 	return &awsmiddleware.RegisterServiceMetadata{
    206 		Region:        region,
    207 		ServiceID:     ServiceID,
    208 		OperationName: "DeleteKeySigningKey",
    209 	}
    210 }