CfnCodeSigningConfigProps
- class aws_cdk.aws_lambda.CfnCodeSigningConfigProps(*, allowed_publishers, code_signing_policies=None, description=None, tags=None)
Bases:
object
Properties for defining a
CfnCodeSigningConfig
.- Parameters:
allowed_publishers (
Union
[IResolvable
,AllowedPublishersProperty
,Dict
[str
,Any
]]) – List of allowed publishers.code_signing_policies (
Union
[IResolvable
,CodeSigningPoliciesProperty
,Dict
[str
,Any
],None
]) – The code signing policy controls the validation failure action for signature mismatch or expiry.description (
Optional
[str
]) – Code signing configuration description.tags (
Optional
[Sequence
[Union
[CfnTag
,Dict
[str
,Any
]]]]) – A list of tags to add to the code signing configuration. .. epigraph:: You must have thelambda:TagResource
,lambda:UntagResource
, andlambda:ListTags
permissions for your IAM principal to manage the AWS CloudFormation stack. If you don’t have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk import aws_lambda as lambda_ cfn_code_signing_config_props = lambda.CfnCodeSigningConfigProps( allowed_publishers=lambda.CfnCodeSigningConfig.AllowedPublishersProperty( signing_profile_version_arns=["signingProfileVersionArns"] ), # the properties below are optional code_signing_policies=lambda.CfnCodeSigningConfig.CodeSigningPoliciesProperty( untrusted_artifact_on_deployment="untrustedArtifactOnDeployment" ), description="description", tags=[CfnTag( key="key", value="value" )] )
Attributes
- allowed_publishers
List of allowed publishers.
- code_signing_policies
The code signing policy controls the validation failure action for signature mismatch or expiry.
- description
Code signing configuration description.
- tags
A list of tags to add to the code signing configuration.
You must have the
lambda:TagResource
,lambda:UntagResource
, andlambda:ListTags
permissions for your IAM principal to manage the AWS CloudFormation stack. If you don’t have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.