-
Notifications
You must be signed in to change notification settings - Fork 597
/
api_op_ModifyEbsDefaultKmsKeyId.go
152 lines (139 loc) · 5.15 KB
/
api_op_ModifyEbsDefaultKmsKeyId.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
// Code generated by smithy-go-codegen DO NOT EDIT.
package ec2
import (
"context"
awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
"github.com/aws/aws-sdk-go-v2/aws/signer/v4"
"github.com/aws/smithy-go/middleware"
smithyhttp "github.com/aws/smithy-go/transport/http"
)
// Changes the default customer master key (CMK) for EBS encryption by default for
// your account in this Region. AWS creates a unique AWS managed CMK in each Region
// for use with encryption by default. If you change the default CMK to a symmetric
// customer managed CMK, it is used instead of the AWS managed CMK. To reset the
// default CMK to the AWS managed CMK for EBS, use ResetEbsDefaultKmsKeyId. Amazon
// EBS does not support asymmetric CMKs. If you delete or disable the customer
// managed CMK that you specified for use with encryption by default, your
// instances will fail to launch. For more information, see Amazon EBS encryption
// (https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html) in the
// Amazon Elastic Compute Cloud User Guide.
func (c *Client) ModifyEbsDefaultKmsKeyId(ctx context.Context, params *ModifyEbsDefaultKmsKeyIdInput, optFns ...func(*Options)) (*ModifyEbsDefaultKmsKeyIdOutput, error) {
if params == nil {
params = &ModifyEbsDefaultKmsKeyIdInput{}
}
result, metadata, err := c.invokeOperation(ctx, "ModifyEbsDefaultKmsKeyId", params, optFns, addOperationModifyEbsDefaultKmsKeyIdMiddlewares)
if err != nil {
return nil, err
}
out := result.(*ModifyEbsDefaultKmsKeyIdOutput)
out.ResultMetadata = metadata
return out, nil
}
type ModifyEbsDefaultKmsKeyIdInput struct {
// The identifier of the AWS Key Management Service (AWS KMS) customer master key
// (CMK) to use for Amazon EBS encryption. If this parameter is not specified, your
// AWS managed CMK for EBS is used. If KmsKeyId is specified, the encrypted state
// must be true. You can specify the CMK using any of the following:
//
// * Key ID. For
// example, 1234abcd-12ab-34cd-56ef-1234567890ab.
//
// * Key alias. For example,
// alias/ExampleAlias.
//
// * Key ARN. For example,
// arn:aws:kms:us-east-1:012345678910:key/1234abcd-12ab-34cd-56ef-1234567890ab.
//
// *
// Alias ARN. For example,
// arn:aws:kms:us-east-1:012345678910:alias/ExampleAlias.
//
// AWS authenticates the
// CMK asynchronously. Therefore, if you specify an ID, alias, or ARN that is not
// valid, the action can appear to complete, but eventually fails. Amazon EBS does
// not support asymmetric CMKs.
//
// This member is required.
KmsKeyId *string
// Checks whether you have the required permissions for the action, without
// actually making the request, and provides an error response. If you have the
// required permissions, the error response is DryRunOperation. Otherwise, it is
// UnauthorizedOperation.
DryRun *bool
}
type ModifyEbsDefaultKmsKeyIdOutput struct {
// The Amazon Resource Name (ARN) of the default CMK for encryption by default.
KmsKeyId *string
// Metadata pertaining to the operation's result.
ResultMetadata middleware.Metadata
}
func addOperationModifyEbsDefaultKmsKeyIdMiddlewares(stack *middleware.Stack, options Options) (err error) {
err = stack.Serialize.Add(&awsEc2query_serializeOpModifyEbsDefaultKmsKeyId{}, middleware.After)
if err != nil {
return err
}
err = stack.Deserialize.Add(&awsEc2query_deserializeOpModifyEbsDefaultKmsKeyId{}, middleware.After)
if err != nil {
return err
}
if err = addSetLoggerMiddleware(stack, options); err != nil {
return err
}
if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil {
return err
}
if err = addResolveEndpointMiddleware(stack, options); err != nil {
return err
}
if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil {
return err
}
if err = addRetryMiddlewares(stack, options); err != nil {
return err
}
if err = addHTTPSignerV4Middleware(stack, options); err != nil {
return err
}
if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil {
return err
}
if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil {
return err
}
if err = addClientUserAgent(stack); err != nil {
return err
}
if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = addOpModifyEbsDefaultKmsKeyIdValidationMiddleware(stack); err != nil {
return err
}
if err = stack.Initialize.Add(newServiceMetadataMiddleware_opModifyEbsDefaultKmsKeyId(options.Region), middleware.Before); err != nil {
return err
}
if err = addRequestIDRetrieverMiddleware(stack); err != nil {
return err
}
if err = addResponseErrorMiddleware(stack); err != nil {
return err
}
if err = addRequestResponseLogging(stack, options); err != nil {
return err
}
return nil
}
func newServiceMetadataMiddleware_opModifyEbsDefaultKmsKeyId(region string) *awsmiddleware.RegisterServiceMetadata {
return &awsmiddleware.RegisterServiceMetadata{
Region: region,
ServiceID: ServiceID,
SigningName: "ec2",
OperationName: "ModifyEbsDefaultKmsKeyId",
}
}