CfnCodeSigningConfigMixinProps
- class aws_cdk.mixins_preview.aws_lambda.mixins.CfnCodeSigningConfigMixinProps(*, allowed_publishers=None, code_signing_policies=None, description=None, tags=None)
Bases:
objectProperties for CfnCodeSigningConfigPropsMixin.
- Parameters:
allowed_publishers (
Union[IResolvable,AllowedPublishersProperty,Dict[str,Any],None]) – List of allowed publishers.code_signing_policies (
Union[IResolvable,CodeSigningPoliciesProperty,Dict[str,Any],None]) – The code signing policy controls the validation failure action for signature mismatch or expiry.description (
Optional[str]) – Code signing configuration description.tags (
Optional[Sequence[Union[CfnTag,Dict[str,Any]]]]) – A list of tags to add to the code signing configuration. .. epigraph:: You must have thelambda:TagResource,lambda:UntagResource, andlambda:ListTagspermissions for your IAM principal to manage the CloudFormation stack. If you don’t have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_lambda import mixins as lambda_mixins cfn_code_signing_config_mixin_props = lambda_mixins.CfnCodeSigningConfigMixinProps( allowed_publishers=lambda_mixins.CfnCodeSigningConfigPropsMixin.AllowedPublishersProperty( signing_profile_version_arns=["signingProfileVersionArns"] ), code_signing_policies=lambda_mixins.CfnCodeSigningConfigPropsMixin.CodeSigningPoliciesProperty( untrusted_artifact_on_deployment="untrustedArtifactOnDeployment" ), description="description", tags=[CfnTag( key="key", value="value" )] )
Attributes
- allowed_publishers
List of allowed publishers.
- code_signing_policies
The code signing policy controls the validation failure action for signature mismatch or expiry.
- description
Code signing configuration description.
- tags
A list of tags to add to the code signing configuration.
You must have the
lambda:TagResource,lambda:UntagResource, andlambda:ListTagspermissions for your IAM principal to manage the CloudFormation stack. If you don’t have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.