Struct aws_sdk_codepipeline::types::WebhookDefinition
source · #[non_exhaustive]pub struct WebhookDefinition {
pub name: String,
pub target_pipeline: String,
pub target_action: String,
pub filters: Vec<WebhookFilterRule>,
pub authentication: WebhookAuthenticationType,
pub authentication_configuration: Option<WebhookAuthConfiguration>,
}
Expand description
Represents information about a webhook and its definition.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.name: String
The name of the webhook.
target_pipeline: String
The name of the pipeline you want to connect to the webhook.
target_action: String
The name of the action in a pipeline you want to connect to the webhook. The action must be from the source (first) stage of the pipeline.
filters: Vec<WebhookFilterRule>
A list of rules applied to the body/payload sent in the POST request to a webhook URL. All defined rules must pass for the request to be accepted and the pipeline started.
authentication: WebhookAuthenticationType
Supported options are GITHUB_HMAC, IP, and UNAUTHENTICATED.
When creating CodePipeline webhooks, do not use your own credentials or reuse the same secret token across multiple webhooks. For optimal security, generate a unique secret token for each webhook you create. The secret token is an arbitrary string that you provide, which GitHub uses to compute and sign the webhook payloads sent to CodePipeline, for protecting the integrity and authenticity of the webhook payloads. Using your own credentials or reusing the same token across multiple webhooks can lead to security vulnerabilities.
If a secret token was provided, it will be redacted in the response.
-
For information about the authentication scheme implemented by GITHUB_HMAC, see Securing your webhooks on the GitHub Developer website.
-
IP rejects webhooks trigger requests unless they originate from an IP address in the IP range whitelisted in the authentication configuration.
-
UNAUTHENTICATED accepts all webhook trigger requests regardless of origin.
authentication_configuration: Option<WebhookAuthConfiguration>
Properties that configure the authentication applied to incoming webhook trigger requests. The required properties depend on the authentication type. For GITHUB_HMAC, only the SecretToken
property must be set. For IP, only the AllowedIPRange
property must be set to a valid CIDR range. For UNAUTHENTICATED, no properties can be set.
Implementations§
source§impl WebhookDefinition
impl WebhookDefinition
sourcepub fn target_pipeline(&self) -> &str
pub fn target_pipeline(&self) -> &str
The name of the pipeline you want to connect to the webhook.
sourcepub fn target_action(&self) -> &str
pub fn target_action(&self) -> &str
The name of the action in a pipeline you want to connect to the webhook. The action must be from the source (first) stage of the pipeline.
sourcepub fn filters(&self) -> &[WebhookFilterRule]
pub fn filters(&self) -> &[WebhookFilterRule]
A list of rules applied to the body/payload sent in the POST request to a webhook URL. All defined rules must pass for the request to be accepted and the pipeline started.
sourcepub fn authentication(&self) -> &WebhookAuthenticationType
pub fn authentication(&self) -> &WebhookAuthenticationType
Supported options are GITHUB_HMAC, IP, and UNAUTHENTICATED.
When creating CodePipeline webhooks, do not use your own credentials or reuse the same secret token across multiple webhooks. For optimal security, generate a unique secret token for each webhook you create. The secret token is an arbitrary string that you provide, which GitHub uses to compute and sign the webhook payloads sent to CodePipeline, for protecting the integrity and authenticity of the webhook payloads. Using your own credentials or reusing the same token across multiple webhooks can lead to security vulnerabilities.
If a secret token was provided, it will be redacted in the response.
-
For information about the authentication scheme implemented by GITHUB_HMAC, see Securing your webhooks on the GitHub Developer website.
-
IP rejects webhooks trigger requests unless they originate from an IP address in the IP range whitelisted in the authentication configuration.
-
UNAUTHENTICATED accepts all webhook trigger requests regardless of origin.
sourcepub fn authentication_configuration(&self) -> Option<&WebhookAuthConfiguration>
pub fn authentication_configuration(&self) -> Option<&WebhookAuthConfiguration>
Properties that configure the authentication applied to incoming webhook trigger requests. The required properties depend on the authentication type. For GITHUB_HMAC, only the SecretToken
property must be set. For IP, only the AllowedIPRange
property must be set to a valid CIDR range. For UNAUTHENTICATED, no properties can be set.
source§impl WebhookDefinition
impl WebhookDefinition
sourcepub fn builder() -> WebhookDefinitionBuilder
pub fn builder() -> WebhookDefinitionBuilder
Creates a new builder-style object to manufacture WebhookDefinition
.
Trait Implementations§
source§impl Clone for WebhookDefinition
impl Clone for WebhookDefinition
source§fn clone(&self) -> WebhookDefinition
fn clone(&self) -> WebhookDefinition
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for WebhookDefinition
impl Debug for WebhookDefinition
source§impl PartialEq for WebhookDefinition
impl PartialEq for WebhookDefinition
impl StructuralPartialEq for WebhookDefinition
Auto Trait Implementations§
impl Freeze for WebhookDefinition
impl RefUnwindSafe for WebhookDefinition
impl Send for WebhookDefinition
impl Sync for WebhookDefinition
impl Unpin for WebhookDefinition
impl UnwindSafe for WebhookDefinition
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
source§unsafe fn clone_to_uninit(&self, dst: *mut T)
unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit
)source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more