src

Go monorepo.
git clone git://code.dwrz.net/src
Log | Files | Refs

api_op_DeleteKeySigningKey.go (4547B)


      1 // Code generated by smithy-go-codegen DO NOT EDIT.
      2 
      3 package route53
      4 
      5 import (
      6 	"context"
      7 	"fmt"
      8 	awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
      9 	"github.com/aws/aws-sdk-go-v2/service/route53/types"
     10 	"github.com/aws/smithy-go/middleware"
     11 	smithyhttp "github.com/aws/smithy-go/transport/http"
     12 )
     13 
     14 // Deletes a key-signing key (KSK). Before you can delete a KSK, you must
     15 // deactivate it. The KSK must be deactivated before you can delete it regardless
     16 // of whether the hosted zone is enabled for DNSSEC signing. You can use
     17 // DeactivateKeySigningKey (https://docs.aws.amazon.com/Route53/latest/APIReference/API_DeactivateKeySigningKey.html)
     18 // to deactivate the key before you delete it. Use GetDNSSEC (https://docs.aws.amazon.com/Route53/latest/APIReference/API_GetDNSSEC.html)
     19 // to verify that the KSK is in an INACTIVE status.
     20 func (c *Client) DeleteKeySigningKey(ctx context.Context, params *DeleteKeySigningKeyInput, optFns ...func(*Options)) (*DeleteKeySigningKeyOutput, error) {
     21 	if params == nil {
     22 		params = &DeleteKeySigningKeyInput{}
     23 	}
     24 
     25 	result, metadata, err := c.invokeOperation(ctx, "DeleteKeySigningKey", params, optFns, c.addOperationDeleteKeySigningKeyMiddlewares)
     26 	if err != nil {
     27 		return nil, err
     28 	}
     29 
     30 	out := result.(*DeleteKeySigningKeyOutput)
     31 	out.ResultMetadata = metadata
     32 	return out, nil
     33 }
     34 
     35 type DeleteKeySigningKeyInput struct {
     36 
     37 	// A unique string used to identify a hosted zone.
     38 	//
     39 	// This member is required.
     40 	HostedZoneId *string
     41 
     42 	// A string used to identify a key-signing key (KSK).
     43 	//
     44 	// This member is required.
     45 	Name *string
     46 
     47 	noSmithyDocumentSerde
     48 }
     49 
     50 type DeleteKeySigningKeyOutput struct {
     51 
     52 	// A complex type that describes change information about changes made to your
     53 	// hosted zone.
     54 	//
     55 	// This member is required.
     56 	ChangeInfo *types.ChangeInfo
     57 
     58 	// Metadata pertaining to the operation's result.
     59 	ResultMetadata middleware.Metadata
     60 
     61 	noSmithyDocumentSerde
     62 }
     63 
     64 func (c *Client) addOperationDeleteKeySigningKeyMiddlewares(stack *middleware.Stack, options Options) (err error) {
     65 	if err := stack.Serialize.Add(&setOperationInputMiddleware{}, middleware.After); err != nil {
     66 		return err
     67 	}
     68 	err = stack.Serialize.Add(&awsRestxml_serializeOpDeleteKeySigningKey{}, middleware.After)
     69 	if err != nil {
     70 		return err
     71 	}
     72 	err = stack.Deserialize.Add(&awsRestxml_deserializeOpDeleteKeySigningKey{}, middleware.After)
     73 	if err != nil {
     74 		return err
     75 	}
     76 	if err := addProtocolFinalizerMiddlewares(stack, options, "DeleteKeySigningKey"); err != nil {
     77 		return fmt.Errorf("add protocol finalizers: %v", err)
     78 	}
     79 
     80 	if err = addlegacyEndpointContextSetter(stack, options); err != nil {
     81 		return err
     82 	}
     83 	if err = addSetLoggerMiddleware(stack, options); err != nil {
     84 		return err
     85 	}
     86 	if err = addClientRequestID(stack); err != nil {
     87 		return err
     88 	}
     89 	if err = addComputeContentLength(stack); err != nil {
     90 		return err
     91 	}
     92 	if err = addResolveEndpointMiddleware(stack, options); err != nil {
     93 		return err
     94 	}
     95 	if err = addComputePayloadSHA256(stack); err != nil {
     96 		return err
     97 	}
     98 	if err = addRetry(stack, options); err != nil {
     99 		return err
    100 	}
    101 	if err = addRawResponseToMetadata(stack); err != nil {
    102 		return err
    103 	}
    104 	if err = addRecordResponseTiming(stack); err != nil {
    105 		return err
    106 	}
    107 	if err = addClientUserAgent(stack, options); err != nil {
    108 		return err
    109 	}
    110 	if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
    111 		return err
    112 	}
    113 	if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
    114 		return err
    115 	}
    116 	if err = addSetLegacyContextSigningOptionsMiddleware(stack); err != nil {
    117 		return err
    118 	}
    119 	if err = addOpDeleteKeySigningKeyValidationMiddleware(stack); err != nil {
    120 		return err
    121 	}
    122 	if err = stack.Initialize.Add(newServiceMetadataMiddleware_opDeleteKeySigningKey(options.Region), middleware.Before); err != nil {
    123 		return err
    124 	}
    125 	if err = addRecursionDetection(stack); err != nil {
    126 		return err
    127 	}
    128 	if err = addRequestIDRetrieverMiddleware(stack); err != nil {
    129 		return err
    130 	}
    131 	if err = addResponseErrorMiddleware(stack); err != nil {
    132 		return err
    133 	}
    134 	if err = addSanitizeURLMiddleware(stack); err != nil {
    135 		return err
    136 	}
    137 	if err = addRequestResponseLogging(stack, options); err != nil {
    138 		return err
    139 	}
    140 	if err = addDisableHTTPSMiddleware(stack, options); err != nil {
    141 		return err
    142 	}
    143 	return nil
    144 }
    145 
    146 func newServiceMetadataMiddleware_opDeleteKeySigningKey(region string) *awsmiddleware.RegisterServiceMetadata {
    147 	return &awsmiddleware.RegisterServiceMetadata{
    148 		Region:        region,
    149 		ServiceID:     ServiceID,
    150 		OperationName: "DeleteKeySigningKey",
    151 	}
    152 }