/AWS1/CL_PIPWEBHOOKAUTHCONF¶
The authentication applied to incoming webhook trigger requests.
CONSTRUCTOR
¶
IMPORTING¶
Optional arguments:¶
iv_allowediprange
TYPE /AWS1/PIPWEBHOOKAUTHCONFALWE00
/AWS1/PIPWEBHOOKAUTHCONFALWE00
¶
The property used to configure acceptance of webhooks in an IP address range. For IP, only the
AllowedIPRange
property must be set. This property must be set to a valid CIDR range.
iv_secrettoken
TYPE /AWS1/PIPWEBHOOKAUTHCONFSECR00
/AWS1/PIPWEBHOOKAUTHCONFSECR00
¶
The property used to configure GitHub authentication. For GITHUB_HMAC, only the
SecretToken
property must be set.When creating CodePipeline webhooks, do not use your own credentials or reuse the same secret token across multiple webhooks. For optimal security, generate a unique secret token for each webhook you create. The secret token is an arbitrary string that you provide, which GitHub uses to compute and sign the webhook payloads sent to CodePipeline, for protecting the integrity and authenticity of the webhook payloads. Using your own credentials or reusing the same token across multiple webhooks can lead to security vulnerabilities.
If a secret token was provided, it will be redacted in the response.
Queryable Attributes¶
AllowedIPRange¶
The property used to configure acceptance of webhooks in an IP address range. For IP, only the
AllowedIPRange
property must be set. This property must be set to a valid CIDR range.
Accessible with the following methods¶
Method | Description |
---|---|
GET_ALLOWEDIPRANGE() |
Getter for ALLOWEDIPRANGE, with configurable default |
ASK_ALLOWEDIPRANGE() |
Getter for ALLOWEDIPRANGE w/ exceptions if field has no valu |
HAS_ALLOWEDIPRANGE() |
Determine if ALLOWEDIPRANGE has a value |
SecretToken¶
The property used to configure GitHub authentication. For GITHUB_HMAC, only the
SecretToken
property must be set.When creating CodePipeline webhooks, do not use your own credentials or reuse the same secret token across multiple webhooks. For optimal security, generate a unique secret token for each webhook you create. The secret token is an arbitrary string that you provide, which GitHub uses to compute and sign the webhook payloads sent to CodePipeline, for protecting the integrity and authenticity of the webhook payloads. Using your own credentials or reusing the same token across multiple webhooks can lead to security vulnerabilities.
If a secret token was provided, it will be redacted in the response.
Accessible with the following methods¶
Method | Description |
---|---|
GET_SECRETTOKEN() |
Getter for SECRETTOKEN, with configurable default |
ASK_SECRETTOKEN() |
Getter for SECRETTOKEN w/ exceptions if field has no value |
HAS_SECRETTOKEN() |
Determine if SECRETTOKEN has a value |