amazonka-route53-2.0: Amazon Route 53 SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.Route53.CreateKeySigningKey

Description

Creates a new key-signing key (KSK) associated with a hosted zone. You can only have two KSKs per hosted zone.

Synopsis

Creating a Request

data CreateKeySigningKey Source #

See: newCreateKeySigningKey smart constructor.

Constructors

CreateKeySigningKey' 

Fields

  • callerReference :: Text

    A unique string that identifies the request.

  • hostedZoneId :: ResourceId

    The unique string (ID) used to identify a hosted zone.

  • keyManagementServiceArn :: Text

    The Amazon resource name (ARN) for a customer managed key in Key Management Service (KMS). The KeyManagementServiceArn must be unique for each key-signing key (KSK) in a single hosted zone. To see an example of KeyManagementServiceArn that grants the correct permissions for DNSSEC, scroll down to Example.

    You must configure the customer managed customer managed key as follows:

    Status
    Enabled
    Key spec
    ECC_NIST_P256
    Key usage
    Sign and verify
    Key policy
    The key policy must give permission for the following actions:
    • DescribeKey
    • GetPublicKey
    • Sign

    The key policy must also include the Amazon Route 53 service in the principal for your account. Specify the following:

    • "Service": "dnssec-route53.amazonaws.com"

    For more information about working with a customer managed key in KMS, see Key Management Service concepts.

  • name :: Text

    A string used to identify a key-signing key (KSK). Name can include numbers, letters, and underscores (_). Name must be unique for each key-signing key in the same hosted zone.

  • status :: Text

    A string specifying the initial status of the key-signing key (KSK). You can set the value to ACTIVE or INACTIVE.

Instances

Instances details
ToHeaders CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

ToPath CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

ToQuery CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

ToElement CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

ToXML CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

AWSRequest CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

Associated Types

type AWSResponse CreateKeySigningKey #

Generic CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

Associated Types

type Rep CreateKeySigningKey :: Type -> Type #

Read CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

Show CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

NFData CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

Methods

rnf :: CreateKeySigningKey -> () #

Eq CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

Hashable CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

type AWSResponse CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

type Rep CreateKeySigningKey Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

type Rep CreateKeySigningKey = D1 ('MetaData "CreateKeySigningKey" "Amazonka.Route53.CreateKeySigningKey" "amazonka-route53-2.0-8wP357MyuPX6rh87d4wklb" 'False) (C1 ('MetaCons "CreateKeySigningKey'" 'PrefixI 'True) ((S1 ('MetaSel ('Just "callerReference") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 Text) :*: S1 ('MetaSel ('Just "hostedZoneId") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 ResourceId)) :*: (S1 ('MetaSel ('Just "keyManagementServiceArn") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 Text) :*: (S1 ('MetaSel ('Just "name") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 Text) :*: S1 ('MetaSel ('Just "status") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 Text)))))

newCreateKeySigningKey Source #

Create a value of CreateKeySigningKey with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

CreateKeySigningKey, createKeySigningKey_callerReference - A unique string that identifies the request.

CreateKeySigningKey, createKeySigningKey_hostedZoneId - The unique string (ID) used to identify a hosted zone.

$sel:keyManagementServiceArn:CreateKeySigningKey', createKeySigningKey_keyManagementServiceArn - The Amazon resource name (ARN) for a customer managed key in Key Management Service (KMS). The KeyManagementServiceArn must be unique for each key-signing key (KSK) in a single hosted zone. To see an example of KeyManagementServiceArn that grants the correct permissions for DNSSEC, scroll down to Example.

You must configure the customer managed customer managed key as follows:

Status
Enabled
Key spec
ECC_NIST_P256
Key usage
Sign and verify
Key policy
The key policy must give permission for the following actions:
  • DescribeKey
  • GetPublicKey
  • Sign

The key policy must also include the Amazon Route 53 service in the principal for your account. Specify the following:

  • "Service": "dnssec-route53.amazonaws.com"

For more information about working with a customer managed key in KMS, see Key Management Service concepts.

CreateKeySigningKey, createKeySigningKey_name - A string used to identify a key-signing key (KSK). Name can include numbers, letters, and underscores (_). Name must be unique for each key-signing key in the same hosted zone.

CreateKeySigningKey, createKeySigningKey_status - A string specifying the initial status of the key-signing key (KSK). You can set the value to ACTIVE or INACTIVE.

Request Lenses

createKeySigningKey_callerReference :: Lens' CreateKeySigningKey Text Source #

A unique string that identifies the request.

createKeySigningKey_hostedZoneId :: Lens' CreateKeySigningKey ResourceId Source #

The unique string (ID) used to identify a hosted zone.

createKeySigningKey_keyManagementServiceArn :: Lens' CreateKeySigningKey Text Source #

The Amazon resource name (ARN) for a customer managed key in Key Management Service (KMS). The KeyManagementServiceArn must be unique for each key-signing key (KSK) in a single hosted zone. To see an example of KeyManagementServiceArn that grants the correct permissions for DNSSEC, scroll down to Example.

You must configure the customer managed customer managed key as follows:

Status
Enabled
Key spec
ECC_NIST_P256
Key usage
Sign and verify
Key policy
The key policy must give permission for the following actions:
  • DescribeKey
  • GetPublicKey
  • Sign

The key policy must also include the Amazon Route 53 service in the principal for your account. Specify the following:

  • "Service": "dnssec-route53.amazonaws.com"

For more information about working with a customer managed key in KMS, see Key Management Service concepts.

createKeySigningKey_name :: Lens' CreateKeySigningKey Text Source #

A string used to identify a key-signing key (KSK). Name can include numbers, letters, and underscores (_). Name must be unique for each key-signing key in the same hosted zone.

createKeySigningKey_status :: Lens' CreateKeySigningKey Text Source #

A string specifying the initial status of the key-signing key (KSK). You can set the value to ACTIVE or INACTIVE.

Destructuring the Response

data CreateKeySigningKeyResponse Source #

See: newCreateKeySigningKeyResponse smart constructor.

Constructors

CreateKeySigningKeyResponse' 

Fields

Instances

Instances details
Generic CreateKeySigningKeyResponse Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

Associated Types

type Rep CreateKeySigningKeyResponse :: Type -> Type #

Read CreateKeySigningKeyResponse Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

Show CreateKeySigningKeyResponse Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

NFData CreateKeySigningKeyResponse Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

Eq CreateKeySigningKeyResponse Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

type Rep CreateKeySigningKeyResponse Source # 
Instance details

Defined in Amazonka.Route53.CreateKeySigningKey

type Rep CreateKeySigningKeyResponse = D1 ('MetaData "CreateKeySigningKeyResponse" "Amazonka.Route53.CreateKeySigningKey" "amazonka-route53-2.0-8wP357MyuPX6rh87d4wklb" 'False) (C1 ('MetaCons "CreateKeySigningKeyResponse'" 'PrefixI 'True) ((S1 ('MetaSel ('Just "httpStatus") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 Int) :*: S1 ('MetaSel ('Just "changeInfo") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 ChangeInfo)) :*: (S1 ('MetaSel ('Just "keySigningKey") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 KeySigningKey) :*: S1 ('MetaSel ('Just "location") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 Text))))

Response Lenses

createKeySigningKeyResponse_location :: Lens' CreateKeySigningKeyResponse Text Source #

The unique URL representing the new key-signing key (KSK).