{-# LANGUAGE DeriveGeneric #-}
{-# LANGUAGE DuplicateRecordFields #-}
{-# LANGUAGE NamedFieldPuns #-}
{-# LANGUAGE OverloadedStrings #-}
{-# LANGUAGE RecordWildCards #-}
{-# LANGUAGE StrictData #-}
{-# LANGUAGE NoImplicitPrelude #-}
{-# OPTIONS_GHC -fno-warn-unused-imports #-}
{-# OPTIONS_GHC -fno-warn-unused-matches #-}

-- Derived from AWS service descriptions, licensed under Apache 2.0.

-- |
-- Module      : Amazonka.Lambda.Types.CodeSigningPolicies
-- Copyright   : (c) 2013-2023 Brendan Hay
-- License     : Mozilla Public License, v. 2.0.
-- Maintainer  : Brendan Hay
-- Stability   : auto-generated
-- Portability : non-portable (GHC extensions)
module Amazonka.Lambda.Types.CodeSigningPolicies where

import qualified Amazonka.Core as Core
import qualified Amazonka.Core.Lens.Internal as Lens
import qualified Amazonka.Data as Data
import Amazonka.Lambda.Types.CodeSigningPolicy
import qualified Amazonka.Prelude as Prelude

-- | Code signing configuration
-- <https://docs.aws.amazon.com/lambda/latest/dg/configuration-codesigning.html#config-codesigning-policies policies>
-- specify the validation failure action for signature mismatch or expiry.
--
-- /See:/ 'newCodeSigningPolicies' smart constructor.
data CodeSigningPolicies = CodeSigningPolicies'
  { -- | Code signing configuration policy for deployment validation failure. If
    -- you set the policy to @Enforce@, Lambda blocks the deployment request if
    -- signature validation checks fail. If you set the policy to @Warn@,
    -- Lambda allows the deployment and creates a CloudWatch log.
    --
    -- Default value: @Warn@
    CodeSigningPolicies -> Maybe CodeSigningPolicy
untrustedArtifactOnDeployment :: Prelude.Maybe CodeSigningPolicy
  }
  deriving (CodeSigningPolicies -> CodeSigningPolicies -> Bool
forall a. (a -> a -> Bool) -> (a -> a -> Bool) -> Eq a
/= :: CodeSigningPolicies -> CodeSigningPolicies -> Bool
$c/= :: CodeSigningPolicies -> CodeSigningPolicies -> Bool
== :: CodeSigningPolicies -> CodeSigningPolicies -> Bool
$c== :: CodeSigningPolicies -> CodeSigningPolicies -> Bool
Prelude.Eq, ReadPrec [CodeSigningPolicies]
ReadPrec CodeSigningPolicies
Int -> ReadS CodeSigningPolicies
ReadS [CodeSigningPolicies]
forall a.
(Int -> ReadS a)
-> ReadS [a] -> ReadPrec a -> ReadPrec [a] -> Read a
readListPrec :: ReadPrec [CodeSigningPolicies]
$creadListPrec :: ReadPrec [CodeSigningPolicies]
readPrec :: ReadPrec CodeSigningPolicies
$creadPrec :: ReadPrec CodeSigningPolicies
readList :: ReadS [CodeSigningPolicies]
$creadList :: ReadS [CodeSigningPolicies]
readsPrec :: Int -> ReadS CodeSigningPolicies
$creadsPrec :: Int -> ReadS CodeSigningPolicies
Prelude.Read, Int -> CodeSigningPolicies -> ShowS
[CodeSigningPolicies] -> ShowS
CodeSigningPolicies -> String
forall a.
(Int -> a -> ShowS) -> (a -> String) -> ([a] -> ShowS) -> Show a
showList :: [CodeSigningPolicies] -> ShowS
$cshowList :: [CodeSigningPolicies] -> ShowS
show :: CodeSigningPolicies -> String
$cshow :: CodeSigningPolicies -> String
showsPrec :: Int -> CodeSigningPolicies -> ShowS
$cshowsPrec :: Int -> CodeSigningPolicies -> ShowS
Prelude.Show, forall x. Rep CodeSigningPolicies x -> CodeSigningPolicies
forall x. CodeSigningPolicies -> Rep CodeSigningPolicies x
forall a.
(forall x. a -> Rep a x) -> (forall x. Rep a x -> a) -> Generic a
$cto :: forall x. Rep CodeSigningPolicies x -> CodeSigningPolicies
$cfrom :: forall x. CodeSigningPolicies -> Rep CodeSigningPolicies x
Prelude.Generic)

-- |
-- Create a value of 'CodeSigningPolicies' with all optional fields omitted.
--
-- Use <https://hackage.haskell.org/package/generic-lens generic-lens> or <https://hackage.haskell.org/package/optics optics> to modify other optional fields.
--
-- The following record fields are available, with the corresponding lenses provided
-- for backwards compatibility:
--
-- 'untrustedArtifactOnDeployment', 'codeSigningPolicies_untrustedArtifactOnDeployment' - Code signing configuration policy for deployment validation failure. If
-- you set the policy to @Enforce@, Lambda blocks the deployment request if
-- signature validation checks fail. If you set the policy to @Warn@,
-- Lambda allows the deployment and creates a CloudWatch log.
--
-- Default value: @Warn@
newCodeSigningPolicies ::
  CodeSigningPolicies
newCodeSigningPolicies :: CodeSigningPolicies
newCodeSigningPolicies =
  CodeSigningPolicies'
    { $sel:untrustedArtifactOnDeployment:CodeSigningPolicies' :: Maybe CodeSigningPolicy
untrustedArtifactOnDeployment =
        forall a. Maybe a
Prelude.Nothing
    }

-- | Code signing configuration policy for deployment validation failure. If
-- you set the policy to @Enforce@, Lambda blocks the deployment request if
-- signature validation checks fail. If you set the policy to @Warn@,
-- Lambda allows the deployment and creates a CloudWatch log.
--
-- Default value: @Warn@
codeSigningPolicies_untrustedArtifactOnDeployment :: Lens.Lens' CodeSigningPolicies (Prelude.Maybe CodeSigningPolicy)
codeSigningPolicies_untrustedArtifactOnDeployment :: Lens' CodeSigningPolicies (Maybe CodeSigningPolicy)
codeSigningPolicies_untrustedArtifactOnDeployment = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\CodeSigningPolicies' {Maybe CodeSigningPolicy
untrustedArtifactOnDeployment :: Maybe CodeSigningPolicy
$sel:untrustedArtifactOnDeployment:CodeSigningPolicies' :: CodeSigningPolicies -> Maybe CodeSigningPolicy
untrustedArtifactOnDeployment} -> Maybe CodeSigningPolicy
untrustedArtifactOnDeployment) (\s :: CodeSigningPolicies
s@CodeSigningPolicies' {} Maybe CodeSigningPolicy
a -> CodeSigningPolicies
s {$sel:untrustedArtifactOnDeployment:CodeSigningPolicies' :: Maybe CodeSigningPolicy
untrustedArtifactOnDeployment = Maybe CodeSigningPolicy
a} :: CodeSigningPolicies)

instance Data.FromJSON CodeSigningPolicies where
  parseJSON :: Value -> Parser CodeSigningPolicies
parseJSON =
    forall a. String -> (Object -> Parser a) -> Value -> Parser a
Data.withObject
      String
"CodeSigningPolicies"
      ( \Object
x ->
          Maybe CodeSigningPolicy -> CodeSigningPolicies
CodeSigningPolicies'
            forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b
Prelude.<$> (Object
x forall a. FromJSON a => Object -> Key -> Parser (Maybe a)
Data..:? Key
"UntrustedArtifactOnDeployment")
      )

instance Prelude.Hashable CodeSigningPolicies where
  hashWithSalt :: Int -> CodeSigningPolicies -> Int
hashWithSalt Int
_salt CodeSigningPolicies' {Maybe CodeSigningPolicy
untrustedArtifactOnDeployment :: Maybe CodeSigningPolicy
$sel:untrustedArtifactOnDeployment:CodeSigningPolicies' :: CodeSigningPolicies -> Maybe CodeSigningPolicy
..} =
    Int
_salt
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe CodeSigningPolicy
untrustedArtifactOnDeployment

instance Prelude.NFData CodeSigningPolicies where
  rnf :: CodeSigningPolicies -> ()
rnf CodeSigningPolicies' {Maybe CodeSigningPolicy
untrustedArtifactOnDeployment :: Maybe CodeSigningPolicy
$sel:untrustedArtifactOnDeployment:CodeSigningPolicies' :: CodeSigningPolicies -> Maybe CodeSigningPolicy
..} =
    forall a. NFData a => a -> ()
Prelude.rnf Maybe CodeSigningPolicy
untrustedArtifactOnDeployment

instance Data.ToJSON CodeSigningPolicies where
  toJSON :: CodeSigningPolicies -> Value
toJSON CodeSigningPolicies' {Maybe CodeSigningPolicy
untrustedArtifactOnDeployment :: Maybe CodeSigningPolicy
$sel:untrustedArtifactOnDeployment:CodeSigningPolicies' :: CodeSigningPolicies -> Maybe CodeSigningPolicy
..} =
    [Pair] -> Value
Data.object
      ( forall a. [Maybe a] -> [a]
Prelude.catMaybes
          [ (Key
"UntrustedArtifactOnDeployment" forall kv v. (KeyValue kv, ToJSON v) => Key -> v -> kv
Data..=)
              forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b
Prelude.<$> Maybe CodeSigningPolicy
untrustedArtifactOnDeployment
          ]
      )