@Generated(value="jsii-pacmak/1.74.0 (build 6d08790)",
date="2023-03-22T19:35:44.119Z")
public interface CodeSigningConfigProps
Example:
import software.amazon.awscdk.services.signer.*; SigningProfile signingProfile = SigningProfile.Builder.create(this, "SigningProfile") .platform(Platform.AWS_LAMBDA_SHA384_ECDSA) .build(); CodeSigningConfig codeSigningConfig = CodeSigningConfig.Builder.create(this, "CodeSigningConfig") .signingProfiles(List.of(signingProfile)) .build(); Function.Builder.create(this, "Function") .codeSigningConfig(codeSigningConfig) .runtime(Runtime.NODEJS_16_X) .handler("index.handler") .code(Code.fromAsset(join(__dirname, "lambda-handler"))) .build();
Modifier and Type | Interface and Description |
---|---|
static class |
CodeSigningConfigProps.Builder
A builder for
CodeSigningConfigProps |
static class |
CodeSigningConfigProps.Jsii$Proxy
An implementation for
CodeSigningConfigProps |
Modifier and Type | Method and Description |
---|---|
static CodeSigningConfigProps.Builder |
builder() |
default java.lang.String |
getDescription()
Code signing configuration description.
|
java.util.List<ISigningProfile> |
getSigningProfiles()
List of signing profiles that defines a trusted user who can sign a code package.
|
default UntrustedArtifactOnDeployment |
getUntrustedArtifactOnDeployment()
Code signing configuration policy for deployment validation failure.
|
java.util.List<ISigningProfile> getSigningProfiles()
default java.lang.String getDescription()
Default: - No description.
default UntrustedArtifactOnDeployment getUntrustedArtifactOnDeployment()
If you set the policy to Enforce, Lambda blocks the deployment request if signature validation checks fail. If you set the policy to Warn, Lambda allows the deployment and creates a CloudWatch log.
Default: UntrustedArtifactOnDeployment.WARN
static CodeSigningConfigProps.Builder builder()
CodeSigningConfigProps.Builder
of CodeSigningConfigProps