@aws-sdk/client-verifiedpermissions 3.682.0 → 3.686.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -74,7 +74,7 @@ naming convention is used for the structures:</p>
74
74
 
75
75
  ## Installing
76
76
 
77
- To install the this package, simply type add or install @aws-sdk/client-verifiedpermissions
77
+ To install this package, simply type add or install @aws-sdk/client-verifiedpermissions
78
78
  using your favorite package manager:
79
79
 
80
80
  - `npm install @aws-sdk/client-verifiedpermissions`
@@ -267,6 +267,14 @@ see LICENSE for more information.
267
267
 
268
268
  ## Client Commands (Operations List)
269
269
 
270
+ <details>
271
+ <summary>
272
+ BatchGetPolicy
273
+ </summary>
274
+
275
+ [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/verifiedpermissions/command/BatchGetPolicyCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-verifiedpermissions/Interface/BatchGetPolicyCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-verifiedpermissions/Interface/BatchGetPolicyCommandOutput/)
276
+
277
+ </details>
270
278
  <details>
271
279
  <summary>
272
280
  BatchIsAuthorized
package/dist-cjs/index.js CHANGED
@@ -25,6 +25,10 @@ __export(src_exports, {
25
25
  ActionIdentifierFilterSensitiveLog: () => ActionIdentifierFilterSensitiveLog,
26
26
  AttributeValue: () => AttributeValue,
27
27
  AttributeValueFilterSensitiveLog: () => AttributeValueFilterSensitiveLog,
28
+ BatchGetPolicyCommand: () => BatchGetPolicyCommand,
29
+ BatchGetPolicyErrorCode: () => BatchGetPolicyErrorCode,
30
+ BatchGetPolicyOutputFilterSensitiveLog: () => BatchGetPolicyOutputFilterSensitiveLog,
31
+ BatchGetPolicyOutputItemFilterSensitiveLog: () => BatchGetPolicyOutputItemFilterSensitiveLog,
28
32
  BatchIsAuthorizedCommand: () => BatchIsAuthorizedCommand,
29
33
  BatchIsAuthorizedInputFilterSensitiveLog: () => BatchIsAuthorizedInputFilterSensitiveLog,
30
34
  BatchIsAuthorizedInputItemFilterSensitiveLog: () => BatchIsAuthorizedInputItemFilterSensitiveLog,
@@ -323,7 +327,7 @@ var VerifiedPermissionsClient = _VerifiedPermissionsClient;
323
327
  // src/VerifiedPermissions.ts
324
328
 
325
329
 
326
- // src/commands/BatchIsAuthorizedCommand.ts
330
+ // src/commands/BatchGetPolicyCommand.ts
327
331
 
328
332
  var import_middleware_serde = require("@smithy/middleware-serde");
329
333
 
@@ -363,9 +367,23 @@ var _AccessDeniedException = class _AccessDeniedException extends VerifiedPermis
363
367
  };
364
368
  __name(_AccessDeniedException, "AccessDeniedException");
365
369
  var AccessDeniedException = _AccessDeniedException;
366
- var Decision = {
367
- ALLOW: "ALLOW",
368
- DENY: "DENY"
370
+ var BatchGetPolicyErrorCode = {
371
+ POLICY_NOT_FOUND: "POLICY_NOT_FOUND",
372
+ POLICY_STORE_NOT_FOUND: "POLICY_STORE_NOT_FOUND"
373
+ };
374
+ var PolicyDefinitionDetail;
375
+ ((PolicyDefinitionDetail2) => {
376
+ PolicyDefinitionDetail2.visit = /* @__PURE__ */ __name((value, visitor) => {
377
+ if (value.static !== void 0)
378
+ return visitor.static(value.static);
379
+ if (value.templateLinked !== void 0)
380
+ return visitor.templateLinked(value.templateLinked);
381
+ return visitor._(value.$unknown[0], value.$unknown[1]);
382
+ }, "visit");
383
+ })(PolicyDefinitionDetail || (PolicyDefinitionDetail = {}));
384
+ var PolicyType = {
385
+ STATIC: "STATIC",
386
+ TEMPLATE_LINKED: "TEMPLATE_LINKED"
369
387
  };
370
388
  var _InternalServerException = class _InternalServerException extends VerifiedPermissionsServiceException {
371
389
  /**
@@ -385,32 +403,6 @@ var _InternalServerException = class _InternalServerException extends VerifiedPe
385
403
  };
386
404
  __name(_InternalServerException, "InternalServerException");
387
405
  var InternalServerException = _InternalServerException;
388
- var ResourceType = {
389
- IDENTITY_SOURCE: "IDENTITY_SOURCE",
390
- POLICY: "POLICY",
391
- POLICY_STORE: "POLICY_STORE",
392
- POLICY_TEMPLATE: "POLICY_TEMPLATE",
393
- SCHEMA: "SCHEMA"
394
- };
395
- var _ResourceNotFoundException = class _ResourceNotFoundException extends VerifiedPermissionsServiceException {
396
- /**
397
- * @internal
398
- */
399
- constructor(opts) {
400
- super({
401
- name: "ResourceNotFoundException",
402
- $fault: "client",
403
- ...opts
404
- });
405
- this.name = "ResourceNotFoundException";
406
- this.$fault = "client";
407
- Object.setPrototypeOf(this, _ResourceNotFoundException.prototype);
408
- this.resourceId = opts.resourceId;
409
- this.resourceType = opts.resourceType;
410
- }
411
- };
412
- __name(_ResourceNotFoundException, "ResourceNotFoundException");
413
- var ResourceNotFoundException = _ResourceNotFoundException;
414
406
  var _ThrottlingException = class _ThrottlingException extends VerifiedPermissionsServiceException {
415
407
  /**
416
408
  * @internal
@@ -451,6 +443,36 @@ var _ValidationException = class _ValidationException extends VerifiedPermission
451
443
  };
452
444
  __name(_ValidationException, "ValidationException");
453
445
  var ValidationException = _ValidationException;
446
+ var Decision = {
447
+ ALLOW: "ALLOW",
448
+ DENY: "DENY"
449
+ };
450
+ var ResourceType = {
451
+ IDENTITY_SOURCE: "IDENTITY_SOURCE",
452
+ POLICY: "POLICY",
453
+ POLICY_STORE: "POLICY_STORE",
454
+ POLICY_TEMPLATE: "POLICY_TEMPLATE",
455
+ SCHEMA: "SCHEMA"
456
+ };
457
+ var _ResourceNotFoundException = class _ResourceNotFoundException extends VerifiedPermissionsServiceException {
458
+ /**
459
+ * @internal
460
+ */
461
+ constructor(opts) {
462
+ super({
463
+ name: "ResourceNotFoundException",
464
+ $fault: "client",
465
+ ...opts
466
+ });
467
+ this.name = "ResourceNotFoundException";
468
+ this.$fault = "client";
469
+ Object.setPrototypeOf(this, _ResourceNotFoundException.prototype);
470
+ this.resourceId = opts.resourceId;
471
+ this.resourceType = opts.resourceType;
472
+ }
473
+ };
474
+ __name(_ResourceNotFoundException, "ResourceNotFoundException");
475
+ var ResourceNotFoundException = _ResourceNotFoundException;
454
476
  var OpenIdConnectTokenSelection;
455
477
  ((OpenIdConnectTokenSelection3) => {
456
478
  OpenIdConnectTokenSelection3.visit = /* @__PURE__ */ __name((value, visitor) => {
@@ -564,10 +586,6 @@ var PolicyEffect = {
564
586
  FORBID: "Forbid",
565
587
  PERMIT: "Permit"
566
588
  };
567
- var PolicyType = {
568
- STATIC: "STATIC",
569
- TEMPLATE_LINKED: "TEMPLATE_LINKED"
570
- };
571
589
  var ValidationMode = {
572
590
  OFF: "OFF",
573
591
  STRICT: "STRICT"
@@ -585,16 +603,6 @@ var EntityReference;
585
603
  var OpenIdIssuer = {
586
604
  COGNITO: "COGNITO"
587
605
  };
588
- var PolicyDefinitionDetail;
589
- ((PolicyDefinitionDetail2) => {
590
- PolicyDefinitionDetail2.visit = /* @__PURE__ */ __name((value, visitor) => {
591
- if (value.static !== void 0)
592
- return visitor.static(value.static);
593
- if (value.templateLinked !== void 0)
594
- return visitor.templateLinked(value.templateLinked);
595
- return visitor._(value.$unknown[0], value.$unknown[1]);
596
- }, "visit");
597
- })(PolicyDefinitionDetail || (PolicyDefinitionDetail = {}));
598
606
  var UpdateOpenIdConnectTokenSelection;
599
607
  ((UpdateOpenIdConnectTokenSelection3) => {
600
608
  UpdateOpenIdConnectTokenSelection3.visit = /* @__PURE__ */ __name((value, visitor) => {
@@ -656,6 +664,10 @@ var AttributeValue;
656
664
  return visitor.set(value.set);
657
665
  if (value.record !== void 0)
658
666
  return visitor.record(value.record);
667
+ if (value.ipaddr !== void 0)
668
+ return visitor.ipaddr(value.ipaddr);
669
+ if (value.decimal !== void 0)
670
+ return visitor.decimal(value.decimal);
659
671
  return visitor._(value.$unknown[0], value.$unknown[1]);
660
672
  }, "visit");
661
673
  })(AttributeValue || (AttributeValue = {}));
@@ -685,6 +697,32 @@ var EntityIdentifierFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
685
697
  ...obj.entityType && { entityType: import_smithy_client.SENSITIVE_STRING },
686
698
  ...obj.entityId && { entityId: import_smithy_client.SENSITIVE_STRING }
687
699
  }), "EntityIdentifierFilterSensitiveLog");
700
+ var StaticPolicyDefinitionDetailFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
701
+ ...obj,
702
+ ...obj.description && { description: import_smithy_client.SENSITIVE_STRING },
703
+ ...obj.statement && { statement: import_smithy_client.SENSITIVE_STRING }
704
+ }), "StaticPolicyDefinitionDetailFilterSensitiveLog");
705
+ var TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
706
+ ...obj,
707
+ ...obj.principal && { principal: EntityIdentifierFilterSensitiveLog(obj.principal) },
708
+ ...obj.resource && { resource: EntityIdentifierFilterSensitiveLog(obj.resource) }
709
+ }), "TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog");
710
+ var PolicyDefinitionDetailFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
711
+ if (obj.static !== void 0)
712
+ return { static: StaticPolicyDefinitionDetailFilterSensitiveLog(obj.static) };
713
+ if (obj.templateLinked !== void 0)
714
+ return { templateLinked: TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog(obj.templateLinked) };
715
+ if (obj.$unknown !== void 0)
716
+ return { [obj.$unknown[0]]: "UNKNOWN" };
717
+ }, "PolicyDefinitionDetailFilterSensitiveLog");
718
+ var BatchGetPolicyOutputItemFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
719
+ ...obj,
720
+ ...obj.definition && { definition: PolicyDefinitionDetailFilterSensitiveLog(obj.definition) }
721
+ }), "BatchGetPolicyOutputItemFilterSensitiveLog");
722
+ var BatchGetPolicyOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
723
+ ...obj,
724
+ ...obj.results && { results: obj.results.map((item) => BatchGetPolicyOutputItemFilterSensitiveLog(item)) }
725
+ }), "BatchGetPolicyOutputFilterSensitiveLog");
688
726
  var EvaluationErrorItemFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
689
727
  ...obj
690
728
  }), "EvaluationErrorItemFilterSensitiveLog");
@@ -913,24 +951,6 @@ var GetIdentitySourceOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) =>
913
951
  ...obj.principalEntityType && { principalEntityType: import_smithy_client.SENSITIVE_STRING },
914
952
  ...obj.configuration && { configuration: ConfigurationDetailFilterSensitiveLog(obj.configuration) }
915
953
  }), "GetIdentitySourceOutputFilterSensitiveLog");
916
- var StaticPolicyDefinitionDetailFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
917
- ...obj,
918
- ...obj.description && { description: import_smithy_client.SENSITIVE_STRING },
919
- ...obj.statement && { statement: import_smithy_client.SENSITIVE_STRING }
920
- }), "StaticPolicyDefinitionDetailFilterSensitiveLog");
921
- var TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
922
- ...obj,
923
- ...obj.principal && { principal: EntityIdentifierFilterSensitiveLog(obj.principal) },
924
- ...obj.resource && { resource: EntityIdentifierFilterSensitiveLog(obj.resource) }
925
- }), "TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog");
926
- var PolicyDefinitionDetailFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
927
- if (obj.static !== void 0)
928
- return { static: StaticPolicyDefinitionDetailFilterSensitiveLog(obj.static) };
929
- if (obj.templateLinked !== void 0)
930
- return { templateLinked: TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog(obj.templateLinked) };
931
- if (obj.$unknown !== void 0)
932
- return { [obj.$unknown[0]]: "UNKNOWN" };
933
- }, "PolicyDefinitionDetailFilterSensitiveLog");
934
954
  var GetPolicyOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
935
955
  ...obj,
936
956
  ...obj.principal && { principal: EntityIdentifierFilterSensitiveLog(obj.principal) },
@@ -1168,6 +1188,10 @@ var AttributeValueFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
1168
1188
  {}
1169
1189
  )
1170
1190
  };
1191
+ if (obj.ipaddr !== void 0)
1192
+ return { ipaddr: import_smithy_client.SENSITIVE_STRING };
1193
+ if (obj.decimal !== void 0)
1194
+ return { decimal: import_smithy_client.SENSITIVE_STRING };
1171
1195
  if (obj.$unknown !== void 0)
1172
1196
  return { [obj.$unknown[0]]: "UNKNOWN" };
1173
1197
  }, "AttributeValueFilterSensitiveLog");
@@ -1265,6 +1289,12 @@ var import_core2 = require("@aws-sdk/core");
1265
1289
 
1266
1290
 
1267
1291
  var import_uuid = require("uuid");
1292
+ var se_BatchGetPolicyCommand = /* @__PURE__ */ __name(async (input, context) => {
1293
+ const headers = sharedHeaders("BatchGetPolicy");
1294
+ let body;
1295
+ body = JSON.stringify((0, import_smithy_client._json)(input));
1296
+ return buildHttpRpcRequest(context, headers, "/", void 0, body);
1297
+ }, "se_BatchGetPolicyCommand");
1268
1298
  var se_BatchIsAuthorizedCommand = /* @__PURE__ */ __name(async (input, context) => {
1269
1299
  const headers = sharedHeaders("BatchIsAuthorized");
1270
1300
  let body;
@@ -1421,6 +1451,19 @@ var se_UpdatePolicyTemplateCommand = /* @__PURE__ */ __name(async (input, contex
1421
1451
  body = JSON.stringify((0, import_smithy_client._json)(input));
1422
1452
  return buildHttpRpcRequest(context, headers, "/", void 0, body);
1423
1453
  }, "se_UpdatePolicyTemplateCommand");
1454
+ var de_BatchGetPolicyCommand = /* @__PURE__ */ __name(async (output, context) => {
1455
+ if (output.statusCode >= 300) {
1456
+ return de_CommandError(output, context);
1457
+ }
1458
+ const data = await (0, import_core2.parseJsonBody)(output.body, context);
1459
+ let contents = {};
1460
+ contents = de_BatchGetPolicyOutput(data, context);
1461
+ const response = {
1462
+ $metadata: deserializeMetadata(output),
1463
+ ...contents
1464
+ };
1465
+ return response;
1466
+ }, "de_BatchGetPolicyCommand");
1424
1467
  var de_BatchIsAuthorizedCommand = /* @__PURE__ */ __name(async (output, context) => {
1425
1468
  if (output.statusCode >= 300) {
1426
1469
  return de_CommandError(output, context);
@@ -1772,15 +1815,15 @@ var de_CommandError = /* @__PURE__ */ __name(async (output, context) => {
1772
1815
  case "InternalServerException":
1773
1816
  case "com.amazonaws.verifiedpermissions#InternalServerException":
1774
1817
  throw await de_InternalServerExceptionRes(parsedOutput, context);
1775
- case "ResourceNotFoundException":
1776
- case "com.amazonaws.verifiedpermissions#ResourceNotFoundException":
1777
- throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
1778
1818
  case "ThrottlingException":
1779
1819
  case "com.amazonaws.verifiedpermissions#ThrottlingException":
1780
1820
  throw await de_ThrottlingExceptionRes(parsedOutput, context);
1781
1821
  case "ValidationException":
1782
1822
  case "com.amazonaws.verifiedpermissions#ValidationException":
1783
1823
  throw await de_ValidationExceptionRes(parsedOutput, context);
1824
+ case "ResourceNotFoundException":
1825
+ case "com.amazonaws.verifiedpermissions#ResourceNotFoundException":
1826
+ throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
1784
1827
  case "ConflictException":
1785
1828
  case "com.amazonaws.verifiedpermissions#ConflictException":
1786
1829
  throw await de_ConflictExceptionRes(parsedOutput, context);
@@ -1862,7 +1905,9 @@ var de_ValidationExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, cont
1862
1905
  var se_AttributeValue = /* @__PURE__ */ __name((input, context) => {
1863
1906
  return AttributeValue.visit(input, {
1864
1907
  boolean: (value) => ({ boolean: value }),
1908
+ decimal: (value) => ({ decimal: value }),
1865
1909
  entityIdentifier: (value) => ({ entityIdentifier: (0, import_smithy_client._json)(value) }),
1910
+ ipaddr: (value) => ({ ipaddr: value }),
1866
1911
  long: (value) => ({ long: value }),
1867
1912
  record: (value) => ({ record: se_RecordAttribute(value, context) }),
1868
1913
  set: (value) => ({ set: se_SetAttribute(value, context) }),
@@ -2022,11 +2067,17 @@ var de_AttributeValue = /* @__PURE__ */ __name((output, context) => {
2022
2067
  if ((0, import_smithy_client.expectBoolean)(output.boolean) !== void 0) {
2023
2068
  return { boolean: (0, import_smithy_client.expectBoolean)(output.boolean) };
2024
2069
  }
2070
+ if ((0, import_smithy_client.expectString)(output.decimal) !== void 0) {
2071
+ return { decimal: (0, import_smithy_client.expectString)(output.decimal) };
2072
+ }
2025
2073
  if (output.entityIdentifier != null) {
2026
2074
  return {
2027
2075
  entityIdentifier: (0, import_smithy_client._json)(output.entityIdentifier)
2028
2076
  };
2029
2077
  }
2078
+ if ((0, import_smithy_client.expectString)(output.ipaddr) !== void 0) {
2079
+ return { ipaddr: (0, import_smithy_client.expectString)(output.ipaddr) };
2080
+ }
2030
2081
  if ((0, import_smithy_client.expectLong)(output.long) !== void 0) {
2031
2082
  return { long: (0, import_smithy_client.expectLong)(output.long) };
2032
2083
  }
@@ -2045,6 +2096,28 @@ var de_AttributeValue = /* @__PURE__ */ __name((output, context) => {
2045
2096
  }
2046
2097
  return { $unknown: Object.entries(output)[0] };
2047
2098
  }, "de_AttributeValue");
2099
+ var de_BatchGetPolicyOutput = /* @__PURE__ */ __name((output, context) => {
2100
+ return (0, import_smithy_client.take)(output, {
2101
+ errors: import_smithy_client._json,
2102
+ results: (_) => de_BatchGetPolicyOutputList(_, context)
2103
+ });
2104
+ }, "de_BatchGetPolicyOutput");
2105
+ var de_BatchGetPolicyOutputItem = /* @__PURE__ */ __name((output, context) => {
2106
+ return (0, import_smithy_client.take)(output, {
2107
+ createdDate: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseRfc3339DateTimeWithOffset)(_)),
2108
+ definition: (_) => (0, import_smithy_client._json)((0, import_core2.awsExpectUnion)(_)),
2109
+ lastUpdatedDate: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseRfc3339DateTimeWithOffset)(_)),
2110
+ policyId: import_smithy_client.expectString,
2111
+ policyStoreId: import_smithy_client.expectString,
2112
+ policyType: import_smithy_client.expectString
2113
+ });
2114
+ }, "de_BatchGetPolicyOutputItem");
2115
+ var de_BatchGetPolicyOutputList = /* @__PURE__ */ __name((output, context) => {
2116
+ const retVal = (output || []).filter((e) => e != null).map((entry) => {
2117
+ return de_BatchGetPolicyOutputItem(entry, context);
2118
+ });
2119
+ return retVal;
2120
+ }, "de_BatchGetPolicyOutputList");
2048
2121
  var de_BatchIsAuthorizedInputItem = /* @__PURE__ */ __name((output, context) => {
2049
2122
  return (0, import_smithy_client.take)(output, {
2050
2123
  action: import_smithy_client._json,
@@ -2391,7 +2464,21 @@ function sharedHeaders(operation) {
2391
2464
  }
2392
2465
  __name(sharedHeaders, "sharedHeaders");
2393
2466
 
2467
+ // src/commands/BatchGetPolicyCommand.ts
2468
+ var _BatchGetPolicyCommand = class _BatchGetPolicyCommand extends import_smithy_client.Command.classBuilder().ep(commonParams).m(function(Command, cs, config, o) {
2469
+ return [
2470
+ (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
2471
+ (0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
2472
+ ];
2473
+ }).s("VerifiedPermissions", "BatchGetPolicy", {}).n("VerifiedPermissionsClient", "BatchGetPolicyCommand").f(void 0, BatchGetPolicyOutputFilterSensitiveLog).ser(se_BatchGetPolicyCommand).de(de_BatchGetPolicyCommand).build() {
2474
+ };
2475
+ __name(_BatchGetPolicyCommand, "BatchGetPolicyCommand");
2476
+ var BatchGetPolicyCommand = _BatchGetPolicyCommand;
2477
+
2394
2478
  // src/commands/BatchIsAuthorizedCommand.ts
2479
+
2480
+
2481
+
2395
2482
  var _BatchIsAuthorizedCommand = class _BatchIsAuthorizedCommand extends import_smithy_client.Command.classBuilder().ep(commonParams).m(function(Command, cs, config, o) {
2396
2483
  return [
2397
2484
  (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
@@ -2754,6 +2841,7 @@ var UpdatePolicyTemplateCommand = _UpdatePolicyTemplateCommand;
2754
2841
 
2755
2842
  // src/VerifiedPermissions.ts
2756
2843
  var commands = {
2844
+ BatchGetPolicyCommand,
2757
2845
  BatchIsAuthorizedCommand,
2758
2846
  BatchIsAuthorizedWithTokenCommand,
2759
2847
  CreateIdentitySourceCommand,
@@ -2810,6 +2898,7 @@ var paginateListPolicyTemplates = (0, import_core.createPaginator)(VerifiedPermi
2810
2898
  VerifiedPermissionsClient,
2811
2899
  VerifiedPermissions,
2812
2900
  $Command,
2901
+ BatchGetPolicyCommand,
2813
2902
  BatchIsAuthorizedCommand,
2814
2903
  BatchIsAuthorizedWithTokenCommand,
2815
2904
  CreateIdentitySourceCommand,
@@ -2841,12 +2930,15 @@ var paginateListPolicyTemplates = (0, import_core.createPaginator)(VerifiedPermi
2841
2930
  paginateListPolicyStores,
2842
2931
  paginateListPolicyTemplates,
2843
2932
  AccessDeniedException,
2844
- Decision,
2933
+ BatchGetPolicyErrorCode,
2934
+ PolicyDefinitionDetail,
2935
+ PolicyType,
2845
2936
  InternalServerException,
2846
- ResourceType,
2847
- ResourceNotFoundException,
2848
2937
  ThrottlingException,
2849
2938
  ValidationException,
2939
+ Decision,
2940
+ ResourceType,
2941
+ ResourceNotFoundException,
2850
2942
  OpenIdConnectTokenSelection,
2851
2943
  Configuration,
2852
2944
  OpenIdConnectTokenSelectionDetail,
@@ -2857,11 +2949,9 @@ var paginateListPolicyTemplates = (0, import_core.createPaginator)(VerifiedPermi
2857
2949
  ServiceQuotaExceededException,
2858
2950
  PolicyDefinition,
2859
2951
  PolicyEffect,
2860
- PolicyType,
2861
2952
  ValidationMode,
2862
2953
  EntityReference,
2863
2954
  OpenIdIssuer,
2864
- PolicyDefinitionDetail,
2865
2955
  UpdateOpenIdConnectTokenSelection,
2866
2956
  UpdateConfiguration,
2867
2957
  PolicyDefinitionItem,
@@ -2872,6 +2962,11 @@ var paginateListPolicyTemplates = (0, import_core.createPaginator)(VerifiedPermi
2872
2962
  EntitiesDefinition,
2873
2963
  ActionIdentifierFilterSensitiveLog,
2874
2964
  EntityIdentifierFilterSensitiveLog,
2965
+ StaticPolicyDefinitionDetailFilterSensitiveLog,
2966
+ TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog,
2967
+ PolicyDefinitionDetailFilterSensitiveLog,
2968
+ BatchGetPolicyOutputItemFilterSensitiveLog,
2969
+ BatchGetPolicyOutputFilterSensitiveLog,
2875
2970
  EvaluationErrorItemFilterSensitiveLog,
2876
2971
  CognitoGroupConfigurationFilterSensitiveLog,
2877
2972
  CognitoGroupConfigurationDetailFilterSensitiveLog,
@@ -2908,9 +3003,6 @@ var paginateListPolicyTemplates = (0, import_core.createPaginator)(VerifiedPermi
2908
3003
  EntityReferenceFilterSensitiveLog,
2909
3004
  IdentitySourceDetailsFilterSensitiveLog,
2910
3005
  GetIdentitySourceOutputFilterSensitiveLog,
2911
- StaticPolicyDefinitionDetailFilterSensitiveLog,
2912
- TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog,
2913
- PolicyDefinitionDetailFilterSensitiveLog,
2914
3006
  GetPolicyOutputFilterSensitiveLog,
2915
3007
  GetPolicyStoreOutputFilterSensitiveLog,
2916
3008
  GetPolicyTemplateOutputFilterSensitiveLog,
@@ -1,4 +1,5 @@
1
1
  import { createAggregatedClient } from "@smithy/smithy-client";
2
+ import { BatchGetPolicyCommand, } from "./commands/BatchGetPolicyCommand";
2
3
  import { BatchIsAuthorizedCommand, } from "./commands/BatchIsAuthorizedCommand";
3
4
  import { BatchIsAuthorizedWithTokenCommand, } from "./commands/BatchIsAuthorizedWithTokenCommand";
4
5
  import { CreateIdentitySourceCommand, } from "./commands/CreateIdentitySourceCommand";
@@ -27,6 +28,7 @@ import { UpdatePolicyStoreCommand, } from "./commands/UpdatePolicyStoreCommand";
27
28
  import { UpdatePolicyTemplateCommand, } from "./commands/UpdatePolicyTemplateCommand";
28
29
  import { VerifiedPermissionsClient } from "./VerifiedPermissionsClient";
29
30
  const commands = {
31
+ BatchGetPolicyCommand,
30
32
  BatchIsAuthorizedCommand,
31
33
  BatchIsAuthorizedWithTokenCommand,
32
34
  CreateIdentitySourceCommand,
@@ -0,0 +1,23 @@
1
+ import { getEndpointPlugin } from "@smithy/middleware-endpoint";
2
+ import { getSerdePlugin } from "@smithy/middleware-serde";
3
+ import { Command as $Command } from "@smithy/smithy-client";
4
+ import { commonParams } from "../endpoint/EndpointParameters";
5
+ import { BatchGetPolicyOutputFilterSensitiveLog } from "../models/models_0";
6
+ import { de_BatchGetPolicyCommand, se_BatchGetPolicyCommand } from "../protocols/Aws_json1_0";
7
+ export { $Command };
8
+ export class BatchGetPolicyCommand extends $Command
9
+ .classBuilder()
10
+ .ep(commonParams)
11
+ .m(function (Command, cs, config, o) {
12
+ return [
13
+ getSerdePlugin(config, this.serialize, this.deserialize),
14
+ getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
15
+ ];
16
+ })
17
+ .s("VerifiedPermissions", "BatchGetPolicy", {})
18
+ .n("VerifiedPermissionsClient", "BatchGetPolicyCommand")
19
+ .f(void 0, BatchGetPolicyOutputFilterSensitiveLog)
20
+ .ser(se_BatchGetPolicyCommand)
21
+ .de(de_BatchGetPolicyCommand)
22
+ .build() {
23
+ }
@@ -1,3 +1,4 @@
1
+ export * from "./BatchGetPolicyCommand";
1
2
  export * from "./BatchIsAuthorizedCommand";
2
3
  export * from "./BatchIsAuthorizedWithTokenCommand";
3
4
  export * from "./CreateIdentitySourceCommand";
@@ -12,9 +12,23 @@ export class AccessDeniedException extends __BaseException {
12
12
  Object.setPrototypeOf(this, AccessDeniedException.prototype);
13
13
  }
14
14
  }
15
- export const Decision = {
16
- ALLOW: "ALLOW",
17
- DENY: "DENY",
15
+ export const BatchGetPolicyErrorCode = {
16
+ POLICY_NOT_FOUND: "POLICY_NOT_FOUND",
17
+ POLICY_STORE_NOT_FOUND: "POLICY_STORE_NOT_FOUND",
18
+ };
19
+ export var PolicyDefinitionDetail;
20
+ (function (PolicyDefinitionDetail) {
21
+ PolicyDefinitionDetail.visit = (value, visitor) => {
22
+ if (value.static !== undefined)
23
+ return visitor.static(value.static);
24
+ if (value.templateLinked !== undefined)
25
+ return visitor.templateLinked(value.templateLinked);
26
+ return visitor._(value.$unknown[0], value.$unknown[1]);
27
+ };
28
+ })(PolicyDefinitionDetail || (PolicyDefinitionDetail = {}));
29
+ export const PolicyType = {
30
+ STATIC: "STATIC",
31
+ TEMPLATE_LINKED: "TEMPLATE_LINKED",
18
32
  };
19
33
  export class InternalServerException extends __BaseException {
20
34
  constructor(opts) {
@@ -29,27 +43,6 @@ export class InternalServerException extends __BaseException {
29
43
  Object.setPrototypeOf(this, InternalServerException.prototype);
30
44
  }
31
45
  }
32
- export const ResourceType = {
33
- IDENTITY_SOURCE: "IDENTITY_SOURCE",
34
- POLICY: "POLICY",
35
- POLICY_STORE: "POLICY_STORE",
36
- POLICY_TEMPLATE: "POLICY_TEMPLATE",
37
- SCHEMA: "SCHEMA",
38
- };
39
- export class ResourceNotFoundException extends __BaseException {
40
- constructor(opts) {
41
- super({
42
- name: "ResourceNotFoundException",
43
- $fault: "client",
44
- ...opts,
45
- });
46
- this.name = "ResourceNotFoundException";
47
- this.$fault = "client";
48
- Object.setPrototypeOf(this, ResourceNotFoundException.prototype);
49
- this.resourceId = opts.resourceId;
50
- this.resourceType = opts.resourceType;
51
- }
52
- }
53
46
  export class ThrottlingException extends __BaseException {
54
47
  constructor(opts) {
55
48
  super({
@@ -80,6 +73,31 @@ export class ValidationException extends __BaseException {
80
73
  this.fieldList = opts.fieldList;
81
74
  }
82
75
  }
76
+ export const Decision = {
77
+ ALLOW: "ALLOW",
78
+ DENY: "DENY",
79
+ };
80
+ export const ResourceType = {
81
+ IDENTITY_SOURCE: "IDENTITY_SOURCE",
82
+ POLICY: "POLICY",
83
+ POLICY_STORE: "POLICY_STORE",
84
+ POLICY_TEMPLATE: "POLICY_TEMPLATE",
85
+ SCHEMA: "SCHEMA",
86
+ };
87
+ export class ResourceNotFoundException extends __BaseException {
88
+ constructor(opts) {
89
+ super({
90
+ name: "ResourceNotFoundException",
91
+ $fault: "client",
92
+ ...opts,
93
+ });
94
+ this.name = "ResourceNotFoundException";
95
+ this.$fault = "client";
96
+ Object.setPrototypeOf(this, ResourceNotFoundException.prototype);
97
+ this.resourceId = opts.resourceId;
98
+ this.resourceType = opts.resourceType;
99
+ }
100
+ }
83
101
  export var OpenIdConnectTokenSelection;
84
102
  (function (OpenIdConnectTokenSelection) {
85
103
  OpenIdConnectTokenSelection.visit = (value, visitor) => {
@@ -183,10 +201,6 @@ export const PolicyEffect = {
183
201
  FORBID: "Forbid",
184
202
  PERMIT: "Permit",
185
203
  };
186
- export const PolicyType = {
187
- STATIC: "STATIC",
188
- TEMPLATE_LINKED: "TEMPLATE_LINKED",
189
- };
190
204
  export const ValidationMode = {
191
205
  OFF: "OFF",
192
206
  STRICT: "STRICT",
@@ -204,16 +218,6 @@ export var EntityReference;
204
218
  export const OpenIdIssuer = {
205
219
  COGNITO: "COGNITO",
206
220
  };
207
- export var PolicyDefinitionDetail;
208
- (function (PolicyDefinitionDetail) {
209
- PolicyDefinitionDetail.visit = (value, visitor) => {
210
- if (value.static !== undefined)
211
- return visitor.static(value.static);
212
- if (value.templateLinked !== undefined)
213
- return visitor.templateLinked(value.templateLinked);
214
- return visitor._(value.$unknown[0], value.$unknown[1]);
215
- };
216
- })(PolicyDefinitionDetail || (PolicyDefinitionDetail = {}));
217
221
  export var UpdateOpenIdConnectTokenSelection;
218
222
  (function (UpdateOpenIdConnectTokenSelection) {
219
223
  UpdateOpenIdConnectTokenSelection.visit = (value, visitor) => {
@@ -275,6 +279,10 @@ export var AttributeValue;
275
279
  return visitor.set(value.set);
276
280
  if (value.record !== undefined)
277
281
  return visitor.record(value.record);
282
+ if (value.ipaddr !== undefined)
283
+ return visitor.ipaddr(value.ipaddr);
284
+ if (value.decimal !== undefined)
285
+ return visitor.decimal(value.decimal);
278
286
  return visitor._(value.$unknown[0], value.$unknown[1]);
279
287
  };
280
288
  })(AttributeValue || (AttributeValue = {}));
@@ -304,6 +312,32 @@ export const EntityIdentifierFilterSensitiveLog = (obj) => ({
304
312
  ...(obj.entityType && { entityType: SENSITIVE_STRING }),
305
313
  ...(obj.entityId && { entityId: SENSITIVE_STRING }),
306
314
  });
315
+ export const StaticPolicyDefinitionDetailFilterSensitiveLog = (obj) => ({
316
+ ...obj,
317
+ ...(obj.description && { description: SENSITIVE_STRING }),
318
+ ...(obj.statement && { statement: SENSITIVE_STRING }),
319
+ });
320
+ export const TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog = (obj) => ({
321
+ ...obj,
322
+ ...(obj.principal && { principal: EntityIdentifierFilterSensitiveLog(obj.principal) }),
323
+ ...(obj.resource && { resource: EntityIdentifierFilterSensitiveLog(obj.resource) }),
324
+ });
325
+ export const PolicyDefinitionDetailFilterSensitiveLog = (obj) => {
326
+ if (obj.static !== undefined)
327
+ return { static: StaticPolicyDefinitionDetailFilterSensitiveLog(obj.static) };
328
+ if (obj.templateLinked !== undefined)
329
+ return { templateLinked: TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog(obj.templateLinked) };
330
+ if (obj.$unknown !== undefined)
331
+ return { [obj.$unknown[0]]: "UNKNOWN" };
332
+ };
333
+ export const BatchGetPolicyOutputItemFilterSensitiveLog = (obj) => ({
334
+ ...obj,
335
+ ...(obj.definition && { definition: PolicyDefinitionDetailFilterSensitiveLog(obj.definition) }),
336
+ });
337
+ export const BatchGetPolicyOutputFilterSensitiveLog = (obj) => ({
338
+ ...obj,
339
+ ...(obj.results && { results: obj.results.map((item) => BatchGetPolicyOutputItemFilterSensitiveLog(item)) }),
340
+ });
307
341
  export const EvaluationErrorItemFilterSensitiveLog = (obj) => ({
308
342
  ...obj,
309
343
  });
@@ -528,24 +562,6 @@ export const GetIdentitySourceOutputFilterSensitiveLog = (obj) => ({
528
562
  ...(obj.principalEntityType && { principalEntityType: SENSITIVE_STRING }),
529
563
  ...(obj.configuration && { configuration: ConfigurationDetailFilterSensitiveLog(obj.configuration) }),
530
564
  });
531
- export const StaticPolicyDefinitionDetailFilterSensitiveLog = (obj) => ({
532
- ...obj,
533
- ...(obj.description && { description: SENSITIVE_STRING }),
534
- ...(obj.statement && { statement: SENSITIVE_STRING }),
535
- });
536
- export const TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog = (obj) => ({
537
- ...obj,
538
- ...(obj.principal && { principal: EntityIdentifierFilterSensitiveLog(obj.principal) }),
539
- ...(obj.resource && { resource: EntityIdentifierFilterSensitiveLog(obj.resource) }),
540
- });
541
- export const PolicyDefinitionDetailFilterSensitiveLog = (obj) => {
542
- if (obj.static !== undefined)
543
- return { static: StaticPolicyDefinitionDetailFilterSensitiveLog(obj.static) };
544
- if (obj.templateLinked !== undefined)
545
- return { templateLinked: TemplateLinkedPolicyDefinitionDetailFilterSensitiveLog(obj.templateLinked) };
546
- if (obj.$unknown !== undefined)
547
- return { [obj.$unknown[0]]: "UNKNOWN" };
548
- };
549
565
  export const GetPolicyOutputFilterSensitiveLog = (obj) => ({
550
566
  ...obj,
551
567
  ...(obj.principal && { principal: EntityIdentifierFilterSensitiveLog(obj.principal) }),
@@ -778,6 +794,10 @@ export const AttributeValueFilterSensitiveLog = (obj) => {
778
794
  return {
779
795
  record: Object.entries(obj.record).reduce((acc, [key, value]) => ((acc[key] = AttributeValueFilterSensitiveLog(value)), acc), {}),
780
796
  };
797
+ if (obj.ipaddr !== undefined)
798
+ return { ipaddr: SENSITIVE_STRING };
799
+ if (obj.decimal !== undefined)
800
+ return { decimal: SENSITIVE_STRING };
781
801
  if (obj.$unknown !== undefined)
782
802
  return { [obj.$unknown[0]]: "UNKNOWN" };
783
803
  };