Struct rusoto_route53::KeySigningKey
source · [−]pub struct KeySigningKey {Show 16 fields
pub created_date: Option<String>,
pub dnskey_record: Option<String>,
pub ds_record: Option<String>,
pub digest_algorithm_mnemonic: Option<String>,
pub digest_algorithm_type: Option<i64>,
pub digest_value: Option<String>,
pub flag: Option<i64>,
pub key_tag: Option<i64>,
pub kms_arn: Option<String>,
pub last_modified_date: Option<String>,
pub name: Option<String>,
pub public_key: Option<String>,
pub signing_algorithm_mnemonic: Option<String>,
pub signing_algorithm_type: Option<i64>,
pub status: Option<String>,
pub status_message: Option<String>,
}
Expand description
A key-signing key (KSK) is a complex type that represents a public/private key pair. The private key is used to generate a digital signature for the zone signing key (ZSK). The public key is stored in the DNS and is used to authenticate the ZSK. A KSK is always associated with a hosted zone; it cannot exist by itself.
Fields
created_date: Option<String>
The date when the key-signing key (KSK) was created.
dnskey_record: Option<String>
A string that represents a DNSKEY record.
ds_record: Option<String>
A string that represents a delegation signer (DS) record.
digest_algorithm_mnemonic: Option<String>
A string used to represent the delegation signer digest algorithm. This value must follow the guidelines provided by RFC-8624 Section 3.3.
digest_algorithm_type: Option<i64>
An integer used to represent the delegation signer digest algorithm. This value must follow the guidelines provided by RFC-8624 Section 3.3.
digest_value: Option<String>
A cryptographic digest of a DNSKEY resource record (RR). DNSKEY records are used to publish the public key that resolvers can use to verify DNSSEC signatures that are used to secure certain kinds of information provided by the DNS system.
flag: Option<i64>
An integer that specifies how the key is used. For key-signing key (KSK), this value is always 257.
key_tag: Option<i64>
An integer used to identify the DNSSEC record for the domain name. The process used to calculate the value is described in RFC-4034 Appendix B.
kms_arn: Option<String>
The Amazon resource name (ARN) used to identify the customer managed customer master key (CMK) in AWS Key Management Service (AWS KMS). The KmsArn
must be unique for each key-signing key (KSK) in a single hosted zone.
You must configure the CMK as follows:
- Status
-
Enabled
- Key spec
-
ECC_NIST_P256
- Key usage
-
Sign and verify
- Key policy
-
The key policy must give permission for the following actions:
-
DescribeKey
-
GetPublicKey
-
Sign
The key policy must also include the Amazon Route 53 service in the principal for your account. Specify the following:
-
"Service": "api-service.dnssec.route53.aws.internal"
-
For more information about working with the customer managed CMK in AWS KMS, see AWS Key Management Service concepts.
last_modified_date: Option<String>
The last time that the key-signing key (KSK) was changed.
name: Option<String>
A string used to identify a key-signing key (KSK). Name
can include numbers, letters, and underscores (_). Name
must be unique for each key-signing key in the same hosted zone.
public_key: Option<String>
The public key, represented as a Base64 encoding, as required by RFC-4034 Page 5.
signing_algorithm_mnemonic: Option<String>
A string used to represent the signing algorithm. This value must follow the guidelines provided by RFC-8624 Section 3.1.
signing_algorithm_type: Option<i64>
An integer used to represent the signing algorithm. This value must follow the guidelines provided by RFC-8624 Section 3.1.
status: Option<String>
A string that represents the current key-signing key (KSK) status.
Status can have one of the following values:
- ACTIVE
-
The KSK is being used for signing.
- INACTIVE
-
The KSK is not being used for signing.
- DELETING
-
The KSK is in the process of being deleted.
- ACTIONNEEDED
-
There is a problem with the KSK that requires you to take action to resolve. For example, the customer managed customer master key (CMK) might have been deleted, or the permissions for the customer managed CMK might have been changed.
- INTERNALFAILURE
-
There was an error during a request. Before you can continue to work with DNSSEC signing, including actions that involve this KSK, you must correct the problem. For example, you may need to activate or deactivate the KSK.
status_message: Option<String>
The status message provided for the following key-signing key (KSK) statuses: ACTION_NEEDED
or INTERNAL_FAILURE
. The status message includes information about what the problem might be and steps that you can take to correct the issue.
Trait Implementations
sourceimpl Clone for KeySigningKey
impl Clone for KeySigningKey
sourcefn clone(&self) -> KeySigningKey
fn clone(&self) -> KeySigningKey
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
sourceimpl Debug for KeySigningKey
impl Debug for KeySigningKey
sourceimpl Default for KeySigningKey
impl Default for KeySigningKey
sourcefn default() -> KeySigningKey
fn default() -> KeySigningKey
Returns the “default value” for a type. Read more
sourceimpl PartialEq<KeySigningKey> for KeySigningKey
impl PartialEq<KeySigningKey> for KeySigningKey
sourcefn eq(&self, other: &KeySigningKey) -> bool
fn eq(&self, other: &KeySigningKey) -> bool
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
sourcefn ne(&self, other: &KeySigningKey) -> bool
fn ne(&self, other: &KeySigningKey) -> bool
This method tests for !=
.
impl StructuralPartialEq for KeySigningKey
Auto Trait Implementations
impl RefUnwindSafe for KeySigningKey
impl Send for KeySigningKey
impl Sync for KeySigningKey
impl Unpin for KeySigningKey
impl UnwindSafe for KeySigningKey
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcefn clone_into(&self, target: &mut T)
fn clone_into(&self, target: &mut T)
toowned_clone_into
)Uses borrowed data to replace owned data, usually by cloning. Read more
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more