CfnCodeSigningConfigMixinProps

class aws_cdk.mixins_preview.aws_lambda.mixins.CfnCodeSigningConfigMixinProps(*, allowed_publishers=None, code_signing_policies=None, description=None, tags=None)

Bases: object

Properties for CfnCodeSigningConfigPropsMixin.

Parameters:
  • allowed_publishers (Union[IResolvable, AllowedPublishersProperty, Dict[str, Any], None]) – List of allowed publishers.

  • code_signing_policies (Union[IResolvable, CodeSigningPoliciesProperty, Dict[str, Any], None]) – The code signing policy controls the validation failure action for signature mismatch or expiry.

  • description (Optional[str]) – Code signing configuration description.

  • tags (Optional[Sequence[Union[CfnTag, Dict[str, Any]]]]) – A list of tags to add to the code signing configuration. .. epigraph:: You must have the lambda:TagResource , lambda:UntagResource , and lambda:ListTags permissions for your IAM principal to manage the CloudFormation stack. If you don’t have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html

ExampleMetadata:

fixture=_generated

Example:

# The code below shows an example of how to instantiate this type.
# The values are placeholders you should change.
from aws_cdk.mixins_preview.aws_lambda import mixins as lambda_mixins

cfn_code_signing_config_mixin_props = lambda_mixins.CfnCodeSigningConfigMixinProps(
    allowed_publishers=lambda_mixins.CfnCodeSigningConfigPropsMixin.AllowedPublishersProperty(
        signing_profile_version_arns=["signingProfileVersionArns"]
    ),
    code_signing_policies=lambda_mixins.CfnCodeSigningConfigPropsMixin.CodeSigningPoliciesProperty(
        untrusted_artifact_on_deployment="untrustedArtifactOnDeployment"
    ),
    description="description",
    tags=[CfnTag(
        key="key",
        value="value"
    )]
)

Attributes

allowed_publishers

List of allowed publishers.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html#cfn-lambda-codesigningconfig-allowedpublishers

code_signing_policies

The code signing policy controls the validation failure action for signature mismatch or expiry.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html#cfn-lambda-codesigningconfig-codesigningpolicies

description

Code signing configuration description.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html#cfn-lambda-codesigningconfig-description

tags

A list of tags to add to the code signing configuration.

You must have the lambda:TagResource , lambda:UntagResource , and lambda:ListTags permissions for your IAM principal to manage the CloudFormation stack. If you don’t have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.

See:

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-codesigningconfig.html#cfn-lambda-codesigningconfig-tags