Skip to main content

key_signing_keys

Creates, updates, deletes or gets a key_signing_key resource or lists key_signing_keys in a region

Overview

Namekey_signing_keys
TypeResource
DescriptionRepresents a key signing key (KSK) associated with a hosted zone. You can only have two KSKs per hosted zone.
Idawscc.route53.key_signing_keys

Fields

NameDatatypeDescription
hosted_zone_idstringThe unique string (ID) used to identify a hosted zone.
statusstringA string specifying the initial status of the key signing key (KSK). You can set the value to ACTIVE or INACTIVE.
namestringAn alphanumeric string used to identify a key signing key (KSK). Name must be unique for each key signing key in the same hosted zone.
key_management_service_arnstringThe Amazon resource name (ARN) for a customer managed key (CMK) in AWS Key Management Service (KMS). The KeyManagementServiceArn must be unique for each key signing key (KSK) in a single hosted zone.
regionstringAWS region.

For more information, see AWS::Route53::KeySigningKey.

Methods

NameResourceAccessible byRequired Params
create_resourcekey_signing_keysINSERTStatus, HostedZoneId, Name, KeyManagementServiceArn, region
delete_resourcekey_signing_keysDELETEIdentifier, region
update_resourcekey_signing_keysUPDATEIdentifier, PatchDocument, region
list_resourceskey_signing_keys_list_onlySELECTregion
get_resourcekey_signing_keysSELECTIdentifier, region

SELECT examples

Gets all properties from an individual key_signing_key.

SELECT
region,
hosted_zone_id,
status,
name,
key_management_service_arn
FROM awscc.route53.key_signing_keys
WHERE
region = 'us-east-1' AND
Identifier = '{{ hosted_zone_id }}|{{ name }}';

INSERT example

Use the following StackQL query and manifest file to create a new key_signing_key resource, using stack-deploy.

/*+ create */
INSERT INTO awscc.route53.key_signing_keys (
HostedZoneId,
Status,
Name,
KeyManagementServiceArn,
region
)
SELECT
'{{ hosted_zone_id }}',
'{{ status }}',
'{{ name }}',
'{{ key_management_service_arn }}',
'{{ region }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

UPDATE example

Use the following StackQL query and manifest file to update a key_signing_key resource, using stack-deploy.

/*+ update */
UPDATE awscc.route53.key_signing_keys
SET PatchDocument = string('{{ {
"Status": status
} | generate_patch_document }}')
WHERE
region = '{{ region }}' AND
Identifier = '{{ hosted_zone_id }}|{{ name }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

DELETE example

/*+ delete */
DELETE FROM awscc.route53.key_signing_keys
WHERE
Identifier = '{{ hosted_zone_id }}|{{ name }}' AND
region = 'us-east-1'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

Additional Parameters

Mutable resources in the Cloud Control provider support additional optional parameters which can be supplied with INSERT, UPDATE, or DELETE operations. These include:

ParameterDescription
ClientToken
A unique identifier to ensure the idempotency of the resource request.This allows the provider to accurately distinguish between retries and new requests.
A client token is valid for 36 hours once used.
After that, a resource request with the same client token is treated as a new request.
If you do not specify a client token, one is generated for inclusion in the request.
RoleArn
The ARN of the IAM role used to perform this resource operation.The role specified must have the permissions required for this operation.
If you do not specify a role, a temporary session is created using your AWS user credentials.
TypeVersionId
For private resource types, the type version to use in this resource operation.If you do not specify a resource version, the default version is used.

Permissions

To operate on the key_signing_keys resource, the following permissions are required:

route53:CreateKeySigningKey,
kms:DescribeKey,
kms:GetPublicKey,
kms:Sign,
kms:CreateGrant