CfnCodeSigningConfigProps

class aws_cdk.aws_lambda.CfnCodeSigningConfigProps(*, allowed_publishers, code_signing_policies=None, description=None, tags=None)

Bases: object

Properties for defining a CfnCodeSigningConfig.

Parameters:
  • allowed_publishers (Union[IResolvable, AllowedPublishersProperty, Dict[str, Any]]) – List of allowed publishers.

  • code_signing_policies (Union[IResolvable, CodeSigningPoliciesProperty, Dict[str, Any], None]) – The code signing policy controls the validation failure action for signature mismatch or expiry.

  • description (Optional[str]) – Code signing configuration description.

  • tags (Optional[Sequence[Union[CfnTag, Dict[str, Any]]]]) – A list of tags to add to the code signing configuration. .. epigraph:: You must have the lambda:TagResource , lambda:UntagResource , and lambda:ListTags permissions for your IAM principal to manage the AWS CloudFormation stack. If you don’t have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html

ExampleMetadata:

fixture=_generated

Example:

# The code below shows an example of how to instantiate this type.
# The values are placeholders you should change.
from aws_cdk import aws_lambda as lambda_

cfn_code_signing_config_props = lambda.CfnCodeSigningConfigProps(
    allowed_publishers=lambda.CfnCodeSigningConfig.AllowedPublishersProperty(
        signing_profile_version_arns=["signingProfileVersionArns"]
    ),

    # the properties below are optional
    code_signing_policies=lambda.CfnCodeSigningConfig.CodeSigningPoliciesProperty(
        untrusted_artifact_on_deployment="untrustedArtifactOnDeployment"
    ),
    description="description",
    tags=[CfnTag(
        key="key",
        value="value"
    )]
)

Attributes

allowed_publishers

List of allowed publishers.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html#cfn-lambda-codesigningconfig-allowedpublishers

code_signing_policies

The code signing policy controls the validation failure action for signature mismatch or expiry.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html#cfn-lambda-codesigningconfig-codesigningpolicies

description

Code signing configuration description.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html#cfn-lambda-codesigningconfig-description

tags

A list of tags to add to the code signing configuration.

You must have the lambda:TagResource , lambda:UntagResource , and lambda:ListTags permissions for your IAM principal to manage the AWS CloudFormation stack. If you don’t have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html#cfn-lambda-codesigningconfig-tags