/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include namespace Aws { namespace Utils { namespace Json { class JsonValue; class JsonView; } // namespace Json } // namespace Utils namespace Lambda { namespace Model { /** *

Code signing configuration policies * specify the validation failure action for signature mismatch or * expiry.

See Also:

AWS * API Reference

*/ class CodeSigningPolicies { public: AWS_LAMBDA_API CodeSigningPolicies(); AWS_LAMBDA_API CodeSigningPolicies(Aws::Utils::Json::JsonView jsonValue); AWS_LAMBDA_API CodeSigningPolicies& operator=(Aws::Utils::Json::JsonView jsonValue); AWS_LAMBDA_API Aws::Utils::Json::JsonValue Jsonize() const; /** *

Code signing configuration policy for deployment validation failure. If you * set the policy to Enforce, Lambda blocks the deployment request if * signature validation checks fail. If you set the policy to Warn, * Lambda allows the deployment and creates a CloudWatch log.

Default * value: Warn

*/ inline const CodeSigningPolicy& GetUntrustedArtifactOnDeployment() const{ return m_untrustedArtifactOnDeployment; } /** *

Code signing configuration policy for deployment validation failure. If you * set the policy to Enforce, Lambda blocks the deployment request if * signature validation checks fail. If you set the policy to Warn, * Lambda allows the deployment and creates a CloudWatch log.

Default * value: Warn

*/ inline bool UntrustedArtifactOnDeploymentHasBeenSet() const { return m_untrustedArtifactOnDeploymentHasBeenSet; } /** *

Code signing configuration policy for deployment validation failure. If you * set the policy to Enforce, Lambda blocks the deployment request if * signature validation checks fail. If you set the policy to Warn, * Lambda allows the deployment and creates a CloudWatch log.

Default * value: Warn

*/ inline void SetUntrustedArtifactOnDeployment(const CodeSigningPolicy& value) { m_untrustedArtifactOnDeploymentHasBeenSet = true; m_untrustedArtifactOnDeployment = value; } /** *

Code signing configuration policy for deployment validation failure. If you * set the policy to Enforce, Lambda blocks the deployment request if * signature validation checks fail. If you set the policy to Warn, * Lambda allows the deployment and creates a CloudWatch log.

Default * value: Warn

*/ inline void SetUntrustedArtifactOnDeployment(CodeSigningPolicy&& value) { m_untrustedArtifactOnDeploymentHasBeenSet = true; m_untrustedArtifactOnDeployment = std::move(value); } /** *

Code signing configuration policy for deployment validation failure. If you * set the policy to Enforce, Lambda blocks the deployment request if * signature validation checks fail. If you set the policy to Warn, * Lambda allows the deployment and creates a CloudWatch log.

Default * value: Warn

*/ inline CodeSigningPolicies& WithUntrustedArtifactOnDeployment(const CodeSigningPolicy& value) { SetUntrustedArtifactOnDeployment(value); return *this;} /** *

Code signing configuration policy for deployment validation failure. If you * set the policy to Enforce, Lambda blocks the deployment request if * signature validation checks fail. If you set the policy to Warn, * Lambda allows the deployment and creates a CloudWatch log.

Default * value: Warn

*/ inline CodeSigningPolicies& WithUntrustedArtifactOnDeployment(CodeSigningPolicy&& value) { SetUntrustedArtifactOnDeployment(std::move(value)); return *this;} private: CodeSigningPolicy m_untrustedArtifactOnDeployment; bool m_untrustedArtifactOnDeploymentHasBeenSet = false; }; } // namespace Model } // namespace Lambda } // namespace Aws