{-# LANGUAGE DeriveGeneric #-} {-# LANGUAGE DuplicateRecordFields #-} {-# LANGUAGE NamedFieldPuns #-} {-# LANGUAGE OverloadedStrings #-} {-# LANGUAGE RecordWildCards #-} {-# LANGUAGE StrictData #-} {-# LANGUAGE NoImplicitPrelude #-} {-# OPTIONS_GHC -fno-warn-unused-imports #-} {-# OPTIONS_GHC -fno-warn-unused-matches #-} -- Derived from AWS service descriptions, licensed under Apache 2.0. -- | -- Module : Amazonka.Lambda.Types.CodeSigningPolicies -- Copyright : (c) 2013-2023 Brendan Hay -- License : Mozilla Public License, v. 2.0. -- Maintainer : Brendan Hay -- Stability : auto-generated -- Portability : non-portable (GHC extensions) module Amazonka.Lambda.Types.CodeSigningPolicies where import qualified Amazonka.Core as Core import qualified Amazonka.Core.Lens.Internal as Lens import qualified Amazonka.Data as Data import Amazonka.Lambda.Types.CodeSigningPolicy import qualified Amazonka.Prelude as Prelude -- | Code signing configuration -- -- specify the validation failure action for signature mismatch or expiry. -- -- /See:/ 'newCodeSigningPolicies' smart constructor. data CodeSigningPolicies = CodeSigningPolicies' { -- | Code signing configuration policy for deployment validation failure. If -- you set the policy to @Enforce@, Lambda blocks the deployment request if -- signature validation checks fail. If you set the policy to @Warn@, -- Lambda allows the deployment and creates a CloudWatch log. -- -- Default value: @Warn@ untrustedArtifactOnDeployment :: Prelude.Maybe CodeSigningPolicy } deriving (Prelude.Eq, Prelude.Read, Prelude.Show, Prelude.Generic) -- | -- Create a value of 'CodeSigningPolicies' with all optional fields omitted. -- -- Use or to modify other optional fields. -- -- The following record fields are available, with the corresponding lenses provided -- for backwards compatibility: -- -- 'untrustedArtifactOnDeployment', 'codeSigningPolicies_untrustedArtifactOnDeployment' - Code signing configuration policy for deployment validation failure. If -- you set the policy to @Enforce@, Lambda blocks the deployment request if -- signature validation checks fail. If you set the policy to @Warn@, -- Lambda allows the deployment and creates a CloudWatch log. -- -- Default value: @Warn@ newCodeSigningPolicies :: CodeSigningPolicies newCodeSigningPolicies = CodeSigningPolicies' { untrustedArtifactOnDeployment = Prelude.Nothing } -- | Code signing configuration policy for deployment validation failure. If -- you set the policy to @Enforce@, Lambda blocks the deployment request if -- signature validation checks fail. If you set the policy to @Warn@, -- Lambda allows the deployment and creates a CloudWatch log. -- -- Default value: @Warn@ codeSigningPolicies_untrustedArtifactOnDeployment :: Lens.Lens' CodeSigningPolicies (Prelude.Maybe CodeSigningPolicy) codeSigningPolicies_untrustedArtifactOnDeployment = Lens.lens (\CodeSigningPolicies' {untrustedArtifactOnDeployment} -> untrustedArtifactOnDeployment) (\s@CodeSigningPolicies' {} a -> s {untrustedArtifactOnDeployment = a} :: CodeSigningPolicies) instance Data.FromJSON CodeSigningPolicies where parseJSON = Data.withObject "CodeSigningPolicies" ( \x -> CodeSigningPolicies' Prelude.<$> (x Data..:? "UntrustedArtifactOnDeployment") ) instance Prelude.Hashable CodeSigningPolicies where hashWithSalt _salt CodeSigningPolicies' {..} = _salt `Prelude.hashWithSalt` untrustedArtifactOnDeployment instance Prelude.NFData CodeSigningPolicies where rnf CodeSigningPolicies' {..} = Prelude.rnf untrustedArtifactOnDeployment instance Data.ToJSON CodeSigningPolicies where toJSON CodeSigningPolicies' {..} = Data.object ( Prelude.catMaybes [ ("UntrustedArtifactOnDeployment" Data..=) Prelude.<$> untrustedArtifactOnDeployment ] )