aws-sdk-route53 1.40.0 → 1.45.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ee11bc947b07196cfbbbd4eb7c1aa245e1a011bcf39c0657129c51899b1353b2
4
- data.tar.gz: e7fb4e3466064f1f0cb532ce9f0c7254696f732cb88f2a7155ec04fcb10955f8
3
+ metadata.gz: 63d900b5addaada664fa550cf6597f86c80bf06a0f6910ec37e8153230b6daca
4
+ data.tar.gz: a9e453abe293968b89651423adcc6ef7bb4cfa707457792c4b7b8706abaf45a0
5
5
  SHA512:
6
- metadata.gz: 6c785bc5dc0e15d719b6616d577a842d710c16c7eb8cbd45c45c6dd635b99a4caaa2e12246f6bdb5ce9e30146dfe268411fe8c1b6a056f76c1cc7455f995ec6a
7
- data.tar.gz: 57157a1dec4ba0e9b219513d1581f1b01e406e49d6519defbed975bbe30003bf5a70630dd953fa6f6709cd6552a80eefdaa97331f9fa698c963418b4ffeb2728
6
+ metadata.gz: 6244f0e8a0467ff7f21c2d53cd7c427521a9e3d5dc3fe1363e88eeecb3142e67f6aeaab285947ce647b65193f5c38464edc0954d452de3a6ec2c2de941db0f10
7
+ data.tar.gz: 07d0d0efe860339bba2f550f0337826ce40d5b3be522807e07bc9f71f754be9acc329ce20d456510b657ac36817e9d02029c8ee24e1c2a2caeb04b7cb4021583
@@ -7,6 +7,7 @@
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
10
+
10
11
  require 'aws-sdk-core'
11
12
  require 'aws-sigv4'
12
13
 
@@ -28,7 +29,7 @@ require_relative 'aws-sdk-route53/customizations'
28
29
  # structure.
29
30
  #
30
31
  # route_53 = Aws::Route53::Client.new
31
- # resp = route_53.associate_vpc_with_hosted_zone(params)
32
+ # resp = route_53.activate_key_signing_key(params)
32
33
  #
33
34
  # See {Client} for more information.
34
35
  #
@@ -45,9 +46,9 @@ require_relative 'aws-sdk-route53/customizations'
45
46
  #
46
47
  # See {Errors} for more information.
47
48
  #
48
- # @service
49
+ # @!group service
49
50
  module Aws::Route53
50
51
 
51
- GEM_VERSION = '1.40.0'
52
+ GEM_VERSION = '1.45.0'
52
53
 
53
54
  end
@@ -87,13 +87,28 @@ module Aws::Route53
87
87
  # * `Aws::Credentials` - Used for configuring static, non-refreshing
88
88
  # credentials.
89
89
  #
90
+ # * `Aws::SharedCredentials` - Used for loading static credentials from a
91
+ # shared file, such as `~/.aws/config`.
92
+ #
93
+ # * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
94
+ #
95
+ # * `Aws::AssumeRoleWebIdentityCredentials` - Used when you need to
96
+ # assume a role after providing credentials via the web.
97
+ #
98
+ # * `Aws::SSOCredentials` - Used for loading credentials from AWS SSO using an
99
+ # access token generated from `aws login`.
100
+ #
101
+ # * `Aws::ProcessCredentials` - Used for loading credentials from a
102
+ # process that outputs to stdout.
103
+ #
90
104
  # * `Aws::InstanceProfileCredentials` - Used for loading credentials
91
105
  # from an EC2 IMDS on an EC2 instance.
92
106
  #
93
- # * `Aws::SharedCredentials` - Used for loading credentials from a
94
- # shared file, such as `~/.aws/config`.
107
+ # * `Aws::ECSCredentials` - Used for loading credentials from
108
+ # instances running in ECS.
95
109
  #
96
- # * `Aws::AssumeRoleCredentials` - Used when you need to assume a role.
110
+ # * `Aws::CognitoIdentityCredentials` - Used for loading credentials
111
+ # from the Cognito Identity service.
97
112
  #
98
113
  # When `:credentials` are not configured directly, the following
99
114
  # locations will be searched for credentials:
@@ -103,10 +118,10 @@ module Aws::Route53
103
118
  # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY']
104
119
  # * `~/.aws/credentials`
105
120
  # * `~/.aws/config`
106
- # * EC2 IMDS instance profile - When used by default, the timeouts are
107
- # very aggressive. Construct and pass an instance of
108
- # `Aws::InstanceProfileCredentails` to enable retries and extended
109
- # timeouts.
121
+ # * EC2/ECS IMDS instance profile - When used by default, the timeouts
122
+ # are very aggressive. Construct and pass an instance of
123
+ # `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
124
+ # enable retries and extended timeouts.
110
125
  #
111
126
  # @option options [required, String] :region
112
127
  # The AWS region to connect to. The configured `:region` is
@@ -314,32 +329,56 @@ module Aws::Route53
314
329
 
315
330
  # @!group API Operations
316
331
 
317
- # Associates an Amazon VPC with a private hosted zone.
332
+ # Activates a key signing key (KSK) so that it can be used for signing
333
+ # by DNSSEC. This operation changes the KSK status to `ACTIVE`.
318
334
  #
319
- # <note markdown="1"> To perform the association, the VPC and the private hosted zone must
320
- # already exist. Also, you can't convert a public hosted zone into a
321
- # private hosted zone.
335
+ # @option params [required, String] :hosted_zone_id
336
+ # A unique string used to identify a hosted zone.
322
337
  #
323
- # </note>
338
+ # @option params [required, String] :name
339
+ # An alphanumeric string used to identify a key signing key (KSK).
324
340
  #
325
- # If you want to associate a VPC that was created by one AWS account
326
- # with a private hosted zone that was created by a different account, do
327
- # one of the following:
341
+ # @return [Types::ActivateKeySigningKeyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
328
342
  #
329
- # * Use the AWS account that created the private hosted zone to submit a
330
- # [CreateVPCAssociationAuthorization][1] request. Then use the account
331
- # that created the VPC to submit an `AssociateVPCWithHostedZone`
332
- # request.
343
+ # * {Types::ActivateKeySigningKeyResponse#change_info #change_info} => Types::ChangeInfo
344
+ #
345
+ # @example Request syntax with placeholder values
346
+ #
347
+ # resp = client.activate_key_signing_key({
348
+ # hosted_zone_id: "ResourceId", # required
349
+ # name: "SigningKeyName", # required
350
+ # })
351
+ #
352
+ # @example Response structure
353
+ #
354
+ # resp.change_info.id #=> String
355
+ # resp.change_info.status #=> String, one of "PENDING", "INSYNC"
356
+ # resp.change_info.submitted_at #=> Time
357
+ # resp.change_info.comment #=> String
333
358
  #
334
- # * If a subnet in the VPC was shared with another account, you can use
335
- # the account that the subnet was shared with to submit an
336
- # `AssociateVPCWithHostedZone` request. For more information about
337
- # sharing subnets, see [Working with Shared VPCs][2].
359
+ # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/ActivateKeySigningKey AWS API Documentation
338
360
  #
361
+ # @overload activate_key_signing_key(params = {})
362
+ # @param [Hash] params ({})
363
+ def activate_key_signing_key(params = {}, options = {})
364
+ req = build_request(:activate_key_signing_key, params)
365
+ req.send_request(options)
366
+ end
367
+
368
+ # Associates an Amazon VPC with a private hosted zone.
339
369
  #
370
+ # To perform the association, the VPC and the private hosted zone must
371
+ # already exist. You can't convert a public hosted zone into a private
372
+ # hosted zone.
340
373
  #
341
- # [1]: https://docs.aws.amazon.com/Route53/latest/APIReference/API_CreateVPCAssociationAuthorization.html
342
- # [2]: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-sharing.html
374
+ # <note markdown="1"> If you want to associate a VPC that was created by using one AWS
375
+ # account with a private hosted zone that was created by using a
376
+ # different account, the AWS account that created the private hosted
377
+ # zone must first submit a `CreateVPCAssociationAuthorization` request.
378
+ # Then the account that created the VPC must submit an
379
+ # `AssociateVPCWithHostedZone` request.
380
+ #
381
+ # </note>
343
382
  #
344
383
  # @option params [required, String] :hosted_zone_id
345
384
  # The ID of the private hosted zone that you want to associate an Amazon
@@ -1115,7 +1154,7 @@ module Aws::Route53
1115
1154
  # action: "CREATE", # required, accepts CREATE, DELETE, UPSERT
1116
1155
  # resource_record_set: { # required
1117
1156
  # name: "DNSName", # required
1118
- # type: "SOA", # required, accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA
1157
+ # type: "SOA", # required, accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA, DS
1119
1158
  # set_identifier: "ResourceRecordSetIdentifier",
1120
1159
  # weight: 1,
1121
1160
  # region: "us-east-1", # accepts us-east-1, us-east-2, us-west-1, us-west-2, ca-central-1, eu-west-1, eu-west-2, eu-west-3, eu-central-1, ap-southeast-1, ap-southeast-2, ap-northeast-1, ap-northeast-2, ap-northeast-3, eu-north-1, sa-east-1, cn-north-1, cn-northwest-1, ap-east-1, me-south-1, ap-south-1, af-south-1, eu-south-1
@@ -1550,6 +1589,118 @@ module Aws::Route53
1550
1589
  req.send_request(options)
1551
1590
  end
1552
1591
 
1592
+ # Creates a new key signing key (KSK) associated with a hosted zone. You
1593
+ # can only have two KSKs per hosted zone.
1594
+ #
1595
+ # @option params [required, String] :caller_reference
1596
+ # A unique string that identifies the request.
1597
+ #
1598
+ # @option params [required, String] :hosted_zone_id
1599
+ # The unique string (ID) used to identify a hosted zone.
1600
+ #
1601
+ # @option params [required, String] :key_management_service_arn
1602
+ # The Amazon resource name (ARN) for a customer managed key (CMK) in AWS
1603
+ # Key Management Service (KMS). The `KeyManagementServiceArn` must be
1604
+ # unique for each key signing key (KSK) in a single hosted zone. To see
1605
+ # an example of `KeyManagementServiceArn` that grants the correct
1606
+ # permissions for DNSSEC, scroll down to **Example**.
1607
+ #
1608
+ # You must configure the CMK as follows:
1609
+ #
1610
+ # Status
1611
+ #
1612
+ # : Enabled
1613
+ #
1614
+ # Key spec
1615
+ #
1616
+ # : ECC\_NIST\_P256
1617
+ #
1618
+ # Key usage
1619
+ #
1620
+ # : Sign and verify
1621
+ #
1622
+ # Key policy
1623
+ #
1624
+ # : The key policy must give permission for the following actions:
1625
+ #
1626
+ # * DescribeKey
1627
+ #
1628
+ # * GetPublicKey
1629
+ #
1630
+ # * Sign
1631
+ #
1632
+ # The key policy must also include the Amazon Route 53 service in the
1633
+ # principal for your account. Specify the following:
1634
+ #
1635
+ # * `"Service": "api-service.dnssec.route53.aws.internal"`
1636
+ #
1637
+ # ^
1638
+ #
1639
+ # For more information about working with CMK in KMS, see [AWS Key
1640
+ # Management Service concepts][1].
1641
+ #
1642
+ #
1643
+ #
1644
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html
1645
+ #
1646
+ # @option params [required, String] :name
1647
+ # An alphanumeric string used to identify a key signing key (KSK).
1648
+ # `Name` must be unique for each key signing key in the same hosted
1649
+ # zone.
1650
+ #
1651
+ # @option params [required, String] :status
1652
+ # A string specifying the initial status of the key signing key (KSK).
1653
+ # You can set the value to `ACTIVE` or `INACTIVE`.
1654
+ #
1655
+ # @return [Types::CreateKeySigningKeyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1656
+ #
1657
+ # * {Types::CreateKeySigningKeyResponse#change_info #change_info} => Types::ChangeInfo
1658
+ # * {Types::CreateKeySigningKeyResponse#key_signing_key #key_signing_key} => Types::KeySigningKey
1659
+ # * {Types::CreateKeySigningKeyResponse#location #location} => String
1660
+ #
1661
+ # @example Request syntax with placeholder values
1662
+ #
1663
+ # resp = client.create_key_signing_key({
1664
+ # caller_reference: "Nonce", # required
1665
+ # hosted_zone_id: "ResourceId", # required
1666
+ # key_management_service_arn: "SigningKeyString", # required
1667
+ # name: "SigningKeyName", # required
1668
+ # status: "SigningKeyStatus", # required
1669
+ # })
1670
+ #
1671
+ # @example Response structure
1672
+ #
1673
+ # resp.change_info.id #=> String
1674
+ # resp.change_info.status #=> String, one of "PENDING", "INSYNC"
1675
+ # resp.change_info.submitted_at #=> Time
1676
+ # resp.change_info.comment #=> String
1677
+ # resp.key_signing_key.name #=> String
1678
+ # resp.key_signing_key.kms_arn #=> String
1679
+ # resp.key_signing_key.flag #=> Integer
1680
+ # resp.key_signing_key.signing_algorithm_mnemonic #=> String
1681
+ # resp.key_signing_key.signing_algorithm_type #=> Integer
1682
+ # resp.key_signing_key.digest_algorithm_mnemonic #=> String
1683
+ # resp.key_signing_key.digest_algorithm_type #=> Integer
1684
+ # resp.key_signing_key.key_tag #=> Integer
1685
+ # resp.key_signing_key.digest_value #=> String
1686
+ # resp.key_signing_key.public_key #=> String
1687
+ # resp.key_signing_key.ds_record #=> String
1688
+ # resp.key_signing_key.dnskey_record #=> String
1689
+ # resp.key_signing_key.status #=> String
1690
+ # resp.key_signing_key.status_message #=> String
1691
+ # resp.key_signing_key.created_date #=> Time
1692
+ # resp.key_signing_key.last_modified_date #=> Time
1693
+ # resp.location #=> String
1694
+ #
1695
+ # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/CreateKeySigningKey AWS API Documentation
1696
+ #
1697
+ # @overload create_key_signing_key(params = {})
1698
+ # @param [Hash] params ({})
1699
+ def create_key_signing_key(params = {}, options = {})
1700
+ req = build_request(:create_key_signing_key, params)
1701
+ req.send_request(options)
1702
+ end
1703
+
1553
1704
  # Creates a configuration for DNS query logging. After you create a
1554
1705
  # query logging configuration, Amazon Route 53 begins to publish log
1555
1706
  # data to an Amazon CloudWatch Logs log group.
@@ -1859,7 +2010,7 @@ module Aws::Route53
1859
2010
  # resp.traffic_policy.id #=> String
1860
2011
  # resp.traffic_policy.version #=> Integer
1861
2012
  # resp.traffic_policy.name #=> String
1862
- # resp.traffic_policy.type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
2013
+ # resp.traffic_policy.type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
1863
2014
  # resp.traffic_policy.document #=> String
1864
2015
  # resp.traffic_policy.comment #=> String
1865
2016
  # resp.location #=> String
@@ -1929,7 +2080,7 @@ module Aws::Route53
1929
2080
  # resp.traffic_policy_instance.message #=> String
1930
2081
  # resp.traffic_policy_instance.traffic_policy_id #=> String
1931
2082
  # resp.traffic_policy_instance.traffic_policy_version #=> Integer
1932
- # resp.traffic_policy_instance.traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
2083
+ # resp.traffic_policy_instance.traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
1933
2084
  # resp.location #=> String
1934
2085
  #
1935
2086
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/CreateTrafficPolicyInstance AWS API Documentation
@@ -1986,7 +2137,7 @@ module Aws::Route53
1986
2137
  # resp.traffic_policy.id #=> String
1987
2138
  # resp.traffic_policy.version #=> Integer
1988
2139
  # resp.traffic_policy.name #=> String
1989
- # resp.traffic_policy.type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
2140
+ # resp.traffic_policy.type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
1990
2141
  # resp.traffic_policy.document #=> String
1991
2142
  # resp.traffic_policy.comment #=> String
1992
2143
  # resp.location #=> String
@@ -2052,6 +2203,43 @@ module Aws::Route53
2052
2203
  req.send_request(options)
2053
2204
  end
2054
2205
 
2206
+ # Deactivates a key signing key (KSK) so that it will not be used for
2207
+ # signing by DNSSEC. This operation changes the KSK status to
2208
+ # `INACTIVE`.
2209
+ #
2210
+ # @option params [required, String] :hosted_zone_id
2211
+ # A unique string used to identify a hosted zone.
2212
+ #
2213
+ # @option params [required, String] :name
2214
+ # An alphanumeric string used to identify a key signing key (KSK).
2215
+ #
2216
+ # @return [Types::DeactivateKeySigningKeyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2217
+ #
2218
+ # * {Types::DeactivateKeySigningKeyResponse#change_info #change_info} => Types::ChangeInfo
2219
+ #
2220
+ # @example Request syntax with placeholder values
2221
+ #
2222
+ # resp = client.deactivate_key_signing_key({
2223
+ # hosted_zone_id: "ResourceId", # required
2224
+ # name: "SigningKeyName", # required
2225
+ # })
2226
+ #
2227
+ # @example Response structure
2228
+ #
2229
+ # resp.change_info.id #=> String
2230
+ # resp.change_info.status #=> String, one of "PENDING", "INSYNC"
2231
+ # resp.change_info.submitted_at #=> Time
2232
+ # resp.change_info.comment #=> String
2233
+ #
2234
+ # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/DeactivateKeySigningKey AWS API Documentation
2235
+ #
2236
+ # @overload deactivate_key_signing_key(params = {})
2237
+ # @param [Hash] params ({})
2238
+ def deactivate_key_signing_key(params = {}, options = {})
2239
+ req = build_request(:deactivate_key_signing_key, params)
2240
+ req.send_request(options)
2241
+ end
2242
+
2055
2243
  # Deletes a health check.
2056
2244
  #
2057
2245
  # Amazon Route 53 does not prevent you from deleting a health check even
@@ -2179,6 +2367,43 @@ module Aws::Route53
2179
2367
  req.send_request(options)
2180
2368
  end
2181
2369
 
2370
+ # Deletes a key signing key (KSK). Before you can delete a KSK, you must
2371
+ # deactivate it. The KSK must be deactived before you can delete it
2372
+ # regardless of whether the hosted zone is enabled for DNSSEC signing.
2373
+ #
2374
+ # @option params [required, String] :hosted_zone_id
2375
+ # A unique string used to identify a hosted zone.
2376
+ #
2377
+ # @option params [required, String] :name
2378
+ # An alphanumeric string used to identify a key signing key (KSK).
2379
+ #
2380
+ # @return [Types::DeleteKeySigningKeyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2381
+ #
2382
+ # * {Types::DeleteKeySigningKeyResponse#change_info #change_info} => Types::ChangeInfo
2383
+ #
2384
+ # @example Request syntax with placeholder values
2385
+ #
2386
+ # resp = client.delete_key_signing_key({
2387
+ # hosted_zone_id: "ResourceId", # required
2388
+ # name: "SigningKeyName", # required
2389
+ # })
2390
+ #
2391
+ # @example Response structure
2392
+ #
2393
+ # resp.change_info.id #=> String
2394
+ # resp.change_info.status #=> String, one of "PENDING", "INSYNC"
2395
+ # resp.change_info.submitted_at #=> Time
2396
+ # resp.change_info.comment #=> String
2397
+ #
2398
+ # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/DeleteKeySigningKey AWS API Documentation
2399
+ #
2400
+ # @overload delete_key_signing_key(params = {})
2401
+ # @param [Hash] params ({})
2402
+ def delete_key_signing_key(params = {}, options = {})
2403
+ req = build_request(:delete_key_signing_key, params)
2404
+ req.send_request(options)
2405
+ end
2406
+
2182
2407
  # Deletes a configuration for DNS query logging. If you delete a
2183
2408
  # configuration, Amazon Route 53 stops sending query logs to CloudWatch
2184
2409
  # Logs. Route 53 doesn't delete any logs that are already in CloudWatch
@@ -2246,6 +2471,24 @@ module Aws::Route53
2246
2471
 
2247
2472
  # Deletes a traffic policy.
2248
2473
  #
2474
+ # When you delete a traffic policy, Route 53 sets a flag on the policy
2475
+ # to indicate that it has been deleted. However, Route 53 never fully
2476
+ # deletes the traffic policy. Note the following:
2477
+ #
2478
+ # * Deleted traffic policies aren't listed if you run
2479
+ # [ListTrafficPolicies][1].
2480
+ #
2481
+ # * There's no way to get a list of deleted policies.
2482
+ #
2483
+ # * If you retain the ID of the policy, you can get information about
2484
+ # the policy, including the traffic policy document, by running
2485
+ # [GetTrafficPolicy][2].
2486
+ #
2487
+ #
2488
+ #
2489
+ # [1]: https://docs.aws.amazon.com/Route53/latest/APIReference/API_ListTrafficPolicies.html
2490
+ # [2]: https://docs.aws.amazon.com/Route53/latest/APIReference/API_GetTrafficPolicy.html
2491
+ #
2249
2492
  # @option params [required, String] :id
2250
2493
  # The ID of the traffic policy that you want to delete.
2251
2494
  #
@@ -2346,6 +2589,39 @@ module Aws::Route53
2346
2589
  req.send_request(options)
2347
2590
  end
2348
2591
 
2592
+ # Disables DNSSEC signing in a specific hosted zone. This action does
2593
+ # not deactivate any key signing keys (KSKs) that are active in the
2594
+ # hosted zone.
2595
+ #
2596
+ # @option params [required, String] :hosted_zone_id
2597
+ # A unique string used to identify a hosted zone.
2598
+ #
2599
+ # @return [Types::DisableHostedZoneDNSSECResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2600
+ #
2601
+ # * {Types::DisableHostedZoneDNSSECResponse#change_info #change_info} => Types::ChangeInfo
2602
+ #
2603
+ # @example Request syntax with placeholder values
2604
+ #
2605
+ # resp = client.disable_hosted_zone_dnssec({
2606
+ # hosted_zone_id: "ResourceId", # required
2607
+ # })
2608
+ #
2609
+ # @example Response structure
2610
+ #
2611
+ # resp.change_info.id #=> String
2612
+ # resp.change_info.status #=> String, one of "PENDING", "INSYNC"
2613
+ # resp.change_info.submitted_at #=> Time
2614
+ # resp.change_info.comment #=> String
2615
+ #
2616
+ # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/DisableHostedZoneDNSSEC AWS API Documentation
2617
+ #
2618
+ # @overload disable_hosted_zone_dnssec(params = {})
2619
+ # @param [Hash] params ({})
2620
+ def disable_hosted_zone_dnssec(params = {}, options = {})
2621
+ req = build_request(:disable_hosted_zone_dnssec, params)
2622
+ req.send_request(options)
2623
+ end
2624
+
2349
2625
  # Disassociates an Amazon Virtual Private Cloud (Amazon VPC) from an
2350
2626
  # Amazon Route 53 private hosted zone. Note the following:
2351
2627
  #
@@ -2416,6 +2692,37 @@ module Aws::Route53
2416
2692
  req.send_request(options)
2417
2693
  end
2418
2694
 
2695
+ # Enables DNSSEC signing in a specific hosted zone.
2696
+ #
2697
+ # @option params [required, String] :hosted_zone_id
2698
+ # A unique string used to identify a hosted zone.
2699
+ #
2700
+ # @return [Types::EnableHostedZoneDNSSECResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2701
+ #
2702
+ # * {Types::EnableHostedZoneDNSSECResponse#change_info #change_info} => Types::ChangeInfo
2703
+ #
2704
+ # @example Request syntax with placeholder values
2705
+ #
2706
+ # resp = client.enable_hosted_zone_dnssec({
2707
+ # hosted_zone_id: "ResourceId", # required
2708
+ # })
2709
+ #
2710
+ # @example Response structure
2711
+ #
2712
+ # resp.change_info.id #=> String
2713
+ # resp.change_info.status #=> String, one of "PENDING", "INSYNC"
2714
+ # resp.change_info.submitted_at #=> Time
2715
+ # resp.change_info.comment #=> String
2716
+ #
2717
+ # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/EnableHostedZoneDNSSEC AWS API Documentation
2718
+ #
2719
+ # @overload enable_hosted_zone_dnssec(params = {})
2720
+ # @param [Hash] params ({})
2721
+ def enable_hosted_zone_dnssec(params = {}, options = {})
2722
+ req = build_request(:enable_hosted_zone_dnssec, params)
2723
+ req.send_request(options)
2724
+ end
2725
+
2419
2726
  # Gets the specified limit for the current account, for example, the
2420
2727
  # maximum number of health checks that you can create using the account.
2421
2728
  #
@@ -2555,6 +2862,55 @@ module Aws::Route53
2555
2862
  req.send_request(options)
2556
2863
  end
2557
2864
 
2865
+ # Returns information about DNSSEC for a specific hosted zone, including
2866
+ # the key signing keys (KSKs) and zone signing keys (ZSKs) in the hosted
2867
+ # zone.
2868
+ #
2869
+ # @option params [required, String] :hosted_zone_id
2870
+ # A unique string used to identify a hosted zone.
2871
+ #
2872
+ # @return [Types::GetDNSSECResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2873
+ #
2874
+ # * {Types::GetDNSSECResponse#status #status} => Types::DNSSECStatus
2875
+ # * {Types::GetDNSSECResponse#key_signing_keys #key_signing_keys} => Array&lt;Types::KeySigningKey&gt;
2876
+ #
2877
+ # @example Request syntax with placeholder values
2878
+ #
2879
+ # resp = client.get_dnssec({
2880
+ # hosted_zone_id: "ResourceId", # required
2881
+ # })
2882
+ #
2883
+ # @example Response structure
2884
+ #
2885
+ # resp.status.serve_signature #=> String
2886
+ # resp.status.status_message #=> String
2887
+ # resp.key_signing_keys #=> Array
2888
+ # resp.key_signing_keys[0].name #=> String
2889
+ # resp.key_signing_keys[0].kms_arn #=> String
2890
+ # resp.key_signing_keys[0].flag #=> Integer
2891
+ # resp.key_signing_keys[0].signing_algorithm_mnemonic #=> String
2892
+ # resp.key_signing_keys[0].signing_algorithm_type #=> Integer
2893
+ # resp.key_signing_keys[0].digest_algorithm_mnemonic #=> String
2894
+ # resp.key_signing_keys[0].digest_algorithm_type #=> Integer
2895
+ # resp.key_signing_keys[0].key_tag #=> Integer
2896
+ # resp.key_signing_keys[0].digest_value #=> String
2897
+ # resp.key_signing_keys[0].public_key #=> String
2898
+ # resp.key_signing_keys[0].ds_record #=> String
2899
+ # resp.key_signing_keys[0].dnskey_record #=> String
2900
+ # resp.key_signing_keys[0].status #=> String
2901
+ # resp.key_signing_keys[0].status_message #=> String
2902
+ # resp.key_signing_keys[0].created_date #=> Time
2903
+ # resp.key_signing_keys[0].last_modified_date #=> Time
2904
+ #
2905
+ # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/GetDNSSEC AWS API Documentation
2906
+ #
2907
+ # @overload get_dnssec(params = {})
2908
+ # @param [Hash] params ({})
2909
+ def get_dnssec(params = {}, options = {})
2910
+ req = build_request(:get_dnssec, params)
2911
+ req.send_request(options)
2912
+ end
2913
+
2558
2914
  # Gets information about whether a specified geographic location is
2559
2915
  # supported for Amazon Route 53 geolocation resource record sets.
2560
2916
  #
@@ -3079,6 +3435,13 @@ module Aws::Route53
3079
3435
 
3080
3436
  # Gets information about a specific traffic policy version.
3081
3437
  #
3438
+ # For information about how of deleting a traffic policy affects the
3439
+ # response from `GetTrafficPolicy`, see [DeleteTrafficPolicy][1].
3440
+ #
3441
+ #
3442
+ #
3443
+ # [1]: https://docs.aws.amazon.com/Route53/latest/APIReference/API_DeleteTrafficPolicy.html
3444
+ #
3082
3445
  # @option params [required, String] :id
3083
3446
  # The ID of the traffic policy that you want to get information about.
3084
3447
  #
@@ -3102,7 +3465,7 @@ module Aws::Route53
3102
3465
  # resp.traffic_policy.id #=> String
3103
3466
  # resp.traffic_policy.version #=> Integer
3104
3467
  # resp.traffic_policy.name #=> String
3105
- # resp.traffic_policy.type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
3468
+ # resp.traffic_policy.type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
3106
3469
  # resp.traffic_policy.document #=> String
3107
3470
  # resp.traffic_policy.comment #=> String
3108
3471
  #
@@ -3154,7 +3517,7 @@ module Aws::Route53
3154
3517
  # resp.traffic_policy_instance.message #=> String
3155
3518
  # resp.traffic_policy_instance.traffic_policy_id #=> String
3156
3519
  # resp.traffic_policy_instance.traffic_policy_version #=> Integer
3157
- # resp.traffic_policy_instance.traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
3520
+ # resp.traffic_policy_instance.traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
3158
3521
  #
3159
3522
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/GetTrafficPolicyInstance AWS API Documentation
3160
3523
  #
@@ -3602,8 +3965,8 @@ module Aws::Route53
3602
3965
  # (Optional) The maximum number of hosted zones that you want Amazon
3603
3966
  # Route 53 to return. If the specified VPC is associated with more than
3604
3967
  # `MaxItems` hosted zones, the response includes a `NextToken` element.
3605
- # `NextToken` contains the hosted zone ID of the first hosted zone that
3606
- # Route 53 will return if you submit another request.
3968
+ # `NextToken` contains an encrypted token that identifies the first
3969
+ # hosted zone that Route 53 will return if you submit another request.
3607
3970
  #
3608
3971
  # @option params [String] :next_token
3609
3972
  # If the previous response included a `NextToken` element, the specified
@@ -3872,7 +4235,7 @@ module Aws::Route53
3872
4235
  # resp = client.list_resource_record_sets({
3873
4236
  # hosted_zone_id: "ResourceId", # required
3874
4237
  # start_record_name: "DNSName",
3875
- # start_record_type: "SOA", # accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA
4238
+ # start_record_type: "SOA", # accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA, DS
3876
4239
  # start_record_identifier: "ResourceRecordSetIdentifier",
3877
4240
  # max_items: 1,
3878
4241
  # })
@@ -3881,7 +4244,7 @@ module Aws::Route53
3881
4244
  #
3882
4245
  # resp.resource_record_sets #=> Array
3883
4246
  # resp.resource_record_sets[0].name #=> String
3884
- # resp.resource_record_sets[0].type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4247
+ # resp.resource_record_sets[0].type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
3885
4248
  # resp.resource_record_sets[0].set_identifier #=> String
3886
4249
  # resp.resource_record_sets[0].weight #=> Integer
3887
4250
  # resp.resource_record_sets[0].region #=> String, one of "us-east-1", "us-east-2", "us-west-1", "us-west-2", "ca-central-1", "eu-west-1", "eu-west-2", "eu-west-3", "eu-central-1", "ap-southeast-1", "ap-southeast-2", "ap-northeast-1", "ap-northeast-2", "ap-northeast-3", "eu-north-1", "sa-east-1", "cn-north-1", "cn-northwest-1", "ap-east-1", "me-south-1", "ap-south-1", "af-south-1", "eu-south-1"
@@ -3900,7 +4263,7 @@ module Aws::Route53
3900
4263
  # resp.resource_record_sets[0].traffic_policy_instance_id #=> String
3901
4264
  # resp.is_truncated #=> Boolean
3902
4265
  # resp.next_record_name #=> String
3903
- # resp.next_record_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4266
+ # resp.next_record_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
3904
4267
  # resp.next_record_identifier #=> String
3905
4268
  # resp.max_items #=> Integer
3906
4269
  #
@@ -4072,6 +4435,13 @@ module Aws::Route53
4072
4435
  # that is associated with the current AWS account. Policies are listed
4073
4436
  # in the order that they were created in.
4074
4437
  #
4438
+ # For information about how of deleting a traffic policy affects the
4439
+ # response from `ListTrafficPolicies`, see [DeleteTrafficPolicy][1].
4440
+ #
4441
+ #
4442
+ #
4443
+ # [1]: https://docs.aws.amazon.com/Route53/latest/APIReference/API_DeleteTrafficPolicy.html
4444
+ #
4075
4445
  # @option params [String] :traffic_policy_id_marker
4076
4446
  # (Conditional) For your first request to `ListTrafficPolicies`, don't
4077
4447
  # include the `TrafficPolicyIdMarker` parameter.
@@ -4110,7 +4480,7 @@ module Aws::Route53
4110
4480
  # resp.traffic_policy_summaries #=> Array
4111
4481
  # resp.traffic_policy_summaries[0].id #=> String
4112
4482
  # resp.traffic_policy_summaries[0].name #=> String
4113
- # resp.traffic_policy_summaries[0].type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4483
+ # resp.traffic_policy_summaries[0].type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
4114
4484
  # resp.traffic_policy_summaries[0].latest_version #=> Integer
4115
4485
  # resp.traffic_policy_summaries[0].traffic_policy_count #=> Integer
4116
4486
  # resp.is_truncated #=> Boolean
@@ -4199,7 +4569,7 @@ module Aws::Route53
4199
4569
  # resp = client.list_traffic_policy_instances({
4200
4570
  # hosted_zone_id_marker: "ResourceId",
4201
4571
  # traffic_policy_instance_name_marker: "DNSName",
4202
- # traffic_policy_instance_type_marker: "SOA", # accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA
4572
+ # traffic_policy_instance_type_marker: "SOA", # accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA, DS
4203
4573
  # max_items: 1,
4204
4574
  # })
4205
4575
  #
@@ -4214,10 +4584,10 @@ module Aws::Route53
4214
4584
  # resp.traffic_policy_instances[0].message #=> String
4215
4585
  # resp.traffic_policy_instances[0].traffic_policy_id #=> String
4216
4586
  # resp.traffic_policy_instances[0].traffic_policy_version #=> Integer
4217
- # resp.traffic_policy_instances[0].traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4587
+ # resp.traffic_policy_instances[0].traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
4218
4588
  # resp.hosted_zone_id_marker #=> String
4219
4589
  # resp.traffic_policy_instance_name_marker #=> String
4220
- # resp.traffic_policy_instance_type_marker #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4590
+ # resp.traffic_policy_instance_type_marker #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
4221
4591
  # resp.is_truncated #=> Boolean
4222
4592
  # resp.max_items #=> Integer
4223
4593
  #
@@ -4296,7 +4666,7 @@ module Aws::Route53
4296
4666
  # resp = client.list_traffic_policy_instances_by_hosted_zone({
4297
4667
  # hosted_zone_id: "ResourceId", # required
4298
4668
  # traffic_policy_instance_name_marker: "DNSName",
4299
- # traffic_policy_instance_type_marker: "SOA", # accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA
4669
+ # traffic_policy_instance_type_marker: "SOA", # accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA, DS
4300
4670
  # max_items: 1,
4301
4671
  # })
4302
4672
  #
@@ -4311,9 +4681,9 @@ module Aws::Route53
4311
4681
  # resp.traffic_policy_instances[0].message #=> String
4312
4682
  # resp.traffic_policy_instances[0].traffic_policy_id #=> String
4313
4683
  # resp.traffic_policy_instances[0].traffic_policy_version #=> Integer
4314
- # resp.traffic_policy_instances[0].traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4684
+ # resp.traffic_policy_instances[0].traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
4315
4685
  # resp.traffic_policy_instance_name_marker #=> String
4316
- # resp.traffic_policy_instance_type_marker #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4686
+ # resp.traffic_policy_instance_type_marker #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
4317
4687
  # resp.is_truncated #=> Boolean
4318
4688
  # resp.max_items #=> Integer
4319
4689
  #
@@ -4418,7 +4788,7 @@ module Aws::Route53
4418
4788
  # traffic_policy_version: 1, # required
4419
4789
  # hosted_zone_id_marker: "ResourceId",
4420
4790
  # traffic_policy_instance_name_marker: "DNSName",
4421
- # traffic_policy_instance_type_marker: "SOA", # accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA
4791
+ # traffic_policy_instance_type_marker: "SOA", # accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA, DS
4422
4792
  # max_items: 1,
4423
4793
  # })
4424
4794
  #
@@ -4433,10 +4803,10 @@ module Aws::Route53
4433
4803
  # resp.traffic_policy_instances[0].message #=> String
4434
4804
  # resp.traffic_policy_instances[0].traffic_policy_id #=> String
4435
4805
  # resp.traffic_policy_instances[0].traffic_policy_version #=> Integer
4436
- # resp.traffic_policy_instances[0].traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4806
+ # resp.traffic_policy_instances[0].traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
4437
4807
  # resp.hosted_zone_id_marker #=> String
4438
4808
  # resp.traffic_policy_instance_name_marker #=> String
4439
- # resp.traffic_policy_instance_type_marker #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4809
+ # resp.traffic_policy_instance_type_marker #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
4440
4810
  # resp.is_truncated #=> Boolean
4441
4811
  # resp.max_items #=> Integer
4442
4812
  #
@@ -4499,7 +4869,7 @@ module Aws::Route53
4499
4869
  # resp.traffic_policies[0].id #=> String
4500
4870
  # resp.traffic_policies[0].version #=> Integer
4501
4871
  # resp.traffic_policies[0].name #=> String
4502
- # resp.traffic_policies[0].type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
4872
+ # resp.traffic_policies[0].type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
4503
4873
  # resp.traffic_policies[0].document #=> String
4504
4874
  # resp.traffic_policies[0].comment #=> String
4505
4875
  # resp.is_truncated #=> Boolean
@@ -4626,7 +4996,7 @@ module Aws::Route53
4626
4996
  # resp = client.test_dns_answer({
4627
4997
  # hosted_zone_id: "ResourceId", # required
4628
4998
  # record_name: "DNSName", # required
4629
- # record_type: "SOA", # required, accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA
4999
+ # record_type: "SOA", # required, accepts SOA, A, TXT, NS, CNAME, MX, NAPTR, PTR, SRV, SPF, AAAA, CAA, DS
4630
5000
  # resolver_ip: "IPAddress",
4631
5001
  # edns0_client_subnet_ip: "IPAddress",
4632
5002
  # edns0_client_subnet_mask: "SubnetMask",
@@ -4636,7 +5006,7 @@ module Aws::Route53
4636
5006
  #
4637
5007
  # resp.nameserver #=> String
4638
5008
  # resp.record_name #=> String
4639
- # resp.record_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
5009
+ # resp.record_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
4640
5010
  # resp.record_data #=> Array
4641
5011
  # resp.record_data[0] #=> String
4642
5012
  # resp.response_code #=> String
@@ -5132,7 +5502,7 @@ module Aws::Route53
5132
5502
  # resp.traffic_policy.id #=> String
5133
5503
  # resp.traffic_policy.version #=> Integer
5134
5504
  # resp.traffic_policy.name #=> String
5135
- # resp.traffic_policy.type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
5505
+ # resp.traffic_policy.type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
5136
5506
  # resp.traffic_policy.document #=> String
5137
5507
  # resp.traffic_policy.comment #=> String
5138
5508
  #
@@ -5205,7 +5575,7 @@ module Aws::Route53
5205
5575
  # resp.traffic_policy_instance.message #=> String
5206
5576
  # resp.traffic_policy_instance.traffic_policy_id #=> String
5207
5577
  # resp.traffic_policy_instance.traffic_policy_version #=> Integer
5208
- # resp.traffic_policy_instance.traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA"
5578
+ # resp.traffic_policy_instance.traffic_policy_type #=> String, one of "SOA", "A", "TXT", "NS", "CNAME", "MX", "NAPTR", "PTR", "SRV", "SPF", "AAAA", "CAA", "DS"
5209
5579
  #
5210
5580
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53-2013-04-01/UpdateTrafficPolicyInstance AWS API Documentation
5211
5581
  #
@@ -5229,7 +5599,7 @@ module Aws::Route53
5229
5599
  params: params,
5230
5600
  config: config)
5231
5601
  context[:gem_name] = 'aws-sdk-route53'
5232
- context[:gem_version] = '1.40.0'
5602
+ context[:gem_version] = '1.45.0'
5233
5603
  Seahorse::Client::Request.new(handlers, context)
5234
5604
  end
5235
5605