Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Class: Aws::CodePipeline::Types::WebhookAuthConfiguration

Inherits:
Struct
  • Object
show all
Defined in:
gems/aws-sdk-codepipeline/lib/aws-sdk-codepipeline/types.rb

Overview

The authentication applied to incoming webhook trigger requests.

Constant Summary collapse

SENSITIVE =
[]

Instance Attribute Summary collapse

Instance Attribute Details

#allowed_ip_rangeString

The property used to configure acceptance of webhooks in an IP address range. For IP, only the AllowedIPRange property must be set. This property must be set to a valid CIDR range.

Returns:

  • (String)

5731
5732
5733
5734
5735
5736
# File 'gems/aws-sdk-codepipeline/lib/aws-sdk-codepipeline/types.rb', line 5731

class WebhookAuthConfiguration < Struct.new(
  :allowed_ip_range,
  :secret_token)
  SENSITIVE = []
  include Aws::Structure
end

#secret_tokenString

The property used to configure GitHub authentication. For GITHUB_HMAC, only the SecretToken property must be set.

When creating CodePipeline webhooks, do not use your own credentials or reuse the same secret token across multiple webhooks. For optimal security, generate a unique secret token for each webhook you create. The secret token is an arbitrary string that you provide, which GitHub uses to compute and sign the webhook payloads sent to CodePipeline, for protecting the integrity and authenticity of the webhook payloads. Using your own credentials or reusing the same token across multiple webhooks can lead to security vulnerabilities.

If a secret token was provided, it will be redacted in the response.

Returns:

  • (String)

5731
5732
5733
5734
5735
5736
# File 'gems/aws-sdk-codepipeline/lib/aws-sdk-codepipeline/types.rb', line 5731

class WebhookAuthConfiguration < Struct.new(
  :allowed_ip_range,
  :secret_token)
  SENSITIVE = []
  include Aws::Structure
end