PUT /2020-04-22/code-signing-configs/{CodeSigningConfigArn}

Update the code signing configuration. Changes to the code signing configuration take effect the next time a user tries to deploy a code package to the function.

Servers

Path parameters

Name Type Required Description
CodeSigningConfigArn String Yes

The The Amazon Resource Name (ARN) of the code signing configuration.

Request headers

Name Type Required Description
X-Amz-Content-Sha256 String No
X-Amz-Credential String No
Content-Type String Yes The media type of the request body.

Default value: "application/json"

X-Amz-Date String No
X-Amz-Algorithm String No
X-Amz-SignedHeaders String No
X-Amz-Security-Token String No
X-Amz-Signature String No

Request body fields

Name Type Required Description
CodeSigningPolicies Object No

Code signing configuration policies specify the validation failure action for signature mismatch or expiry.

CodeSigningPolicies.UntrustedArtifactOnDeployment String No

Code signing configuration policy for deployment validation failure. If you set the policy to Enforce, Lambda blocks the deployment request if signature validation checks fail. If you set the policy to Warn, Lambda allows the deployment and creates a CloudWatch log.

Default value: Warn

Valid values:

  • "Warn"
  • "Enforce"
Description String No

Descriptive name for this code signing configuration.

AllowedPublishers Object No

List of signing profiles that can sign a code package.

AllowedPublishers.SigningProfileVersionArns[] Array No

The Amazon Resource Name (ARN) for each of the signing profiles. A signing profile defines a trusted user who can sign a code package.

How to start integrating

  1. Add HTTP Task to your workflow definition.
  2. Search for the API you want to integrate with and click on the name.
    • This loads the API reference documentation and prepares the Http request settings.
  3. Click Test request to test run your request to the API and see the API's response.