@aws-sdk/client-verifiedpermissions 3.775.0 → 3.777.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-types/commands/BatchGetPolicyCommand.d.ts +39 -39
- package/dist-types/commands/BatchIsAuthorizedCommand.d.ts +93 -93
- package/dist-types/commands/BatchIsAuthorizedWithTokenCommand.d.ts +74 -74
- package/dist-types/commands/CreateIdentitySourceCommand.d.ts +14 -14
- package/dist-types/commands/CreatePolicyCommand.d.ts +58 -60
- package/dist-types/commands/CreatePolicyStoreCommand.d.ts +10 -10
- package/dist-types/commands/CreatePolicyTemplateCommand.d.ts +19 -11
- package/dist-types/commands/DeleteIdentitySourceCommand.d.ts +8 -5
- package/dist-types/commands/DeletePolicyCommand.d.ts +8 -5
- package/dist-types/commands/DeletePolicyStoreCommand.d.ts +7 -4
- package/dist-types/commands/DeletePolicyTemplateCommand.d.ts +8 -5
- package/dist-types/commands/GetIdentitySourceCommand.d.ts +15 -15
- package/dist-types/commands/GetPolicyCommand.d.ts +17 -17
- package/dist-types/commands/GetPolicyStoreCommand.d.ts +10 -10
- package/dist-types/commands/GetPolicyTemplateCommand.d.ts +17 -11
- package/dist-types/commands/GetSchemaCommand.d.ts +34 -13
- package/dist-types/commands/IsAuthorizedCommand.d.ts +34 -35
- package/dist-types/commands/IsAuthorizedWithTokenCommand.d.ts +22 -22
- package/dist-types/commands/ListIdentitySourcesCommand.d.ts +15 -15
- package/dist-types/commands/ListPoliciesCommand.d.ts +90 -92
- package/dist-types/commands/ListPolicyStoresCommand.d.ts +11 -11
- package/dist-types/commands/ListPolicyTemplatesCommand.d.ts +15 -15
- package/dist-types/commands/PutSchemaCommand.d.ts +15 -15
- package/dist-types/commands/UpdateIdentitySourceCommand.d.ts +13 -13
- package/dist-types/commands/UpdatePolicyCommand.d.ts +16 -16
- package/dist-types/commands/UpdatePolicyStoreCommand.d.ts +10 -10
- package/dist-types/commands/UpdatePolicyTemplateCommand.d.ts +24 -16
- package/package.json +2 -2
|
@@ -226,73 +226,72 @@ declare const IsAuthorizedCommand_base: {
|
|
|
226
226
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
227
227
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
228
228
|
*
|
|
229
|
-
*
|
|
229
|
+
*
|
|
230
230
|
* @example IsAuthorized - Example 1
|
|
231
231
|
* ```javascript
|
|
232
232
|
* // The following example requests an authorization decision for a principal of type User named Alice, who wants to perform the updatePhoto operation, on a resource of type Photo named VacationPhoto94.jpg.
|
|
233
|
-
*
|
|
234
|
-
*
|
|
233
|
+
*
|
|
234
|
+
* The response shows that the request was allowed by one policy.
|
|
235
235
|
* const input = {
|
|
236
|
-
*
|
|
237
|
-
*
|
|
238
|
-
*
|
|
236
|
+
* action: {
|
|
237
|
+
* actionId: "view",
|
|
238
|
+
* actionType: "Action"
|
|
239
239
|
* },
|
|
240
|
-
*
|
|
241
|
-
*
|
|
242
|
-
*
|
|
243
|
-
*
|
|
240
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
241
|
+
* principal: {
|
|
242
|
+
* entityId: "alice",
|
|
243
|
+
* entityType: "User"
|
|
244
244
|
* },
|
|
245
|
-
*
|
|
246
|
-
*
|
|
247
|
-
*
|
|
245
|
+
* resource: {
|
|
246
|
+
* entityId: "VacationPhoto94.jpg",
|
|
247
|
+
* entityType: "Photo"
|
|
248
248
|
* }
|
|
249
249
|
* };
|
|
250
250
|
* const command = new IsAuthorizedCommand(input);
|
|
251
251
|
* const response = await client.send(command);
|
|
252
|
-
* /* response
|
|
252
|
+
* /* response is
|
|
253
253
|
* {
|
|
254
|
-
* "
|
|
255
|
-
*
|
|
256
|
-
* "determiningPolicies": [
|
|
254
|
+
* decision: "ALLOW",
|
|
255
|
+
* determiningPolicies: [
|
|
257
256
|
* {
|
|
258
|
-
*
|
|
257
|
+
* policyId: "9wYxMpljbbZQb5fcZHyJhY"
|
|
259
258
|
* }
|
|
260
|
-
* ]
|
|
259
|
+
* ],
|
|
260
|
+
* errors: []
|
|
261
261
|
* }
|
|
262
262
|
* *\/
|
|
263
|
-
* // example id: example-1
|
|
264
263
|
* ```
|
|
265
264
|
*
|
|
266
265
|
* @example IsAuthorized - Example 2
|
|
267
266
|
* ```javascript
|
|
268
267
|
* // The following example is the same as the previous example, except that the principal is User::"bob", and the policy store doesn't contain any policy that allows that user access to Album::"alice_folder". The output infers that the Deny was implicit because the list of DeterminingPolicies is empty.
|
|
269
268
|
* const input = {
|
|
270
|
-
*
|
|
271
|
-
*
|
|
272
|
-
*
|
|
269
|
+
* action: {
|
|
270
|
+
* actionId: "view",
|
|
271
|
+
* actionType: "Action"
|
|
273
272
|
* },
|
|
274
|
-
*
|
|
275
|
-
*
|
|
276
|
-
*
|
|
277
|
-
*
|
|
273
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
274
|
+
* principal: {
|
|
275
|
+
* entityId: "bob",
|
|
276
|
+
* entityType: "User"
|
|
278
277
|
* },
|
|
279
|
-
*
|
|
280
|
-
*
|
|
281
|
-
*
|
|
278
|
+
* resource: {
|
|
279
|
+
* entityId: "VacationPhoto94.jpg",
|
|
280
|
+
* entityType: "Photo"
|
|
282
281
|
* }
|
|
283
282
|
* };
|
|
284
283
|
* const command = new IsAuthorizedCommand(input);
|
|
285
284
|
* const response = await client.send(command);
|
|
286
|
-
* /* response
|
|
285
|
+
* /* response is
|
|
287
286
|
* {
|
|
288
|
-
* "
|
|
289
|
-
*
|
|
290
|
-
*
|
|
287
|
+
* decision: "DENY",
|
|
288
|
+
* determiningPolicies: [],
|
|
289
|
+
* errors: []
|
|
291
290
|
* }
|
|
292
291
|
* *\/
|
|
293
|
-
* // example id: example-2
|
|
294
292
|
* ```
|
|
295
293
|
*
|
|
294
|
+
* @public
|
|
296
295
|
*/
|
|
297
296
|
export declare class IsAuthorizedCommand extends IsAuthorizedCommand_base {
|
|
298
297
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -236,44 +236,44 @@ declare const IsAuthorizedWithTokenCommand_base: {
|
|
|
236
236
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
237
237
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
238
238
|
*
|
|
239
|
-
*
|
|
239
|
+
*
|
|
240
240
|
* @example IsAuthorizedWithToken - Example 1
|
|
241
241
|
* ```javascript
|
|
242
242
|
* // The following example requests an authorization decision for a user who was authenticated by Amazon Cognito. The request uses the identity token provided by Amazon Cognito instead of the access token. In this example, the specified information store is configured to return principals as entities of type CognitoUser. The policy store contains a policy with the following statement.
|
|
243
|
-
*
|
|
244
|
-
*
|
|
245
|
-
*
|
|
246
|
-
*
|
|
247
|
-
*
|
|
248
|
-
*
|
|
243
|
+
*
|
|
244
|
+
* permit(
|
|
245
|
+
* principal == CognitoUser::"us-east-1_1a2b3c4d5|a1b2c3d4e5f6g7h8i9j0kalbmc",
|
|
246
|
+
* action,
|
|
247
|
+
* resource == Photo::"VacationPhoto94.jpg"
|
|
248
|
+
* );
|
|
249
249
|
* const input = {
|
|
250
|
-
*
|
|
251
|
-
*
|
|
252
|
-
*
|
|
250
|
+
* action: {
|
|
251
|
+
* actionId: "View",
|
|
252
|
+
* actionType: "Action"
|
|
253
253
|
* },
|
|
254
|
-
*
|
|
255
|
-
*
|
|
256
|
-
*
|
|
257
|
-
*
|
|
258
|
-
*
|
|
254
|
+
* identityToken: "EgZjxMPlbWUyBggAEEUYOdIBCDM3NDlqMGo3qAIAsAIA",
|
|
255
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
256
|
+
* resource: {
|
|
257
|
+
* entityId: "vacationPhoto94.jpg",
|
|
258
|
+
* entityType: "Photo"
|
|
259
259
|
* }
|
|
260
260
|
* };
|
|
261
261
|
* const command = new IsAuthorizedWithTokenCommand(input);
|
|
262
262
|
* const response = await client.send(command);
|
|
263
|
-
* /* response
|
|
263
|
+
* /* response is
|
|
264
264
|
* {
|
|
265
|
-
* "
|
|
266
|
-
*
|
|
267
|
-
* "determiningPolicies": [
|
|
265
|
+
* decision: "ALLOW",
|
|
266
|
+
* determiningPolicies: [
|
|
268
267
|
* {
|
|
269
|
-
*
|
|
268
|
+
* policyId: "9wYxMpljbbZQb5fcZHyJhY"
|
|
270
269
|
* }
|
|
271
|
-
* ]
|
|
270
|
+
* ],
|
|
271
|
+
* errors: []
|
|
272
272
|
* }
|
|
273
273
|
* *\/
|
|
274
|
-
* // example id: example-1
|
|
275
274
|
* ```
|
|
276
275
|
*
|
|
276
|
+
* @public
|
|
277
277
|
*/
|
|
278
278
|
export declare class IsAuthorizedWithTokenCommand extends IsAuthorizedWithTokenCommand_base {
|
|
279
279
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -206,39 +206,39 @@ declare const ListIdentitySourcesCommand_base: {
|
|
|
206
206
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
207
207
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
208
208
|
*
|
|
209
|
-
*
|
|
209
|
+
*
|
|
210
210
|
* @example ListIdentitySources
|
|
211
211
|
* ```javascript
|
|
212
212
|
* // The following example request creates lists the identity sources currently defined in the specified policy store.
|
|
213
213
|
* const input = {
|
|
214
|
-
*
|
|
214
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a"
|
|
215
215
|
* };
|
|
216
216
|
* const command = new ListIdentitySourcesCommand(input);
|
|
217
217
|
* const response = await client.send(command);
|
|
218
|
-
* /* response
|
|
218
|
+
* /* response is
|
|
219
219
|
* {
|
|
220
|
-
*
|
|
220
|
+
* identitySources: [
|
|
221
221
|
* {
|
|
222
|
-
*
|
|
223
|
-
*
|
|
224
|
-
*
|
|
222
|
+
* createdDate: "2023-05-19T20:29:23.66812Z",
|
|
223
|
+
* details: {
|
|
224
|
+
* clientIds: [
|
|
225
225
|
* "a1b2c3d4e5f6g7h8i9j0kalbmc"
|
|
226
226
|
* ],
|
|
227
|
-
*
|
|
228
|
-
*
|
|
229
|
-
*
|
|
227
|
+
* discoveryUrl: "https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5",
|
|
228
|
+
* openIdIssuer: "COGNITO",
|
|
229
|
+
* userPoolArn: "arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5"
|
|
230
230
|
* },
|
|
231
|
-
*
|
|
232
|
-
*
|
|
233
|
-
*
|
|
234
|
-
*
|
|
231
|
+
* identitySourceId: "ISEXAMPLEabcdefg111111",
|
|
232
|
+
* lastUpdatedDate: "2023-05-19T20:29:23.66812Z",
|
|
233
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
234
|
+
* principalEntityType: "User"
|
|
235
235
|
* }
|
|
236
236
|
* ]
|
|
237
237
|
* }
|
|
238
238
|
* *\/
|
|
239
|
-
* // example id: example-1
|
|
240
239
|
* ```
|
|
241
240
|
*
|
|
241
|
+
* @public
|
|
242
242
|
*/
|
|
243
243
|
export declare class ListIdentitySourcesCommand extends ListIdentitySourcesCommand_base {
|
|
244
244
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -210,171 +210,169 @@ declare const ListPoliciesCommand_base: {
|
|
|
210
210
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
211
211
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
212
212
|
*
|
|
213
|
-
*
|
|
213
|
+
*
|
|
214
214
|
* @example ListPolicies - Example 1
|
|
215
215
|
* ```javascript
|
|
216
216
|
* // The following example lists all policies in the policy store.
|
|
217
217
|
* const input = {
|
|
218
|
-
*
|
|
218
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a"
|
|
219
219
|
* };
|
|
220
220
|
* const command = new ListPoliciesCommand(input);
|
|
221
221
|
* const response = await client.send(command);
|
|
222
|
-
* /* response
|
|
222
|
+
* /* response is
|
|
223
223
|
* {
|
|
224
|
-
*
|
|
224
|
+
* policies: [
|
|
225
225
|
* {
|
|
226
|
-
*
|
|
227
|
-
*
|
|
228
|
-
*
|
|
229
|
-
*
|
|
226
|
+
* createdDate: "2024-08-12T18:20:50.99Z",
|
|
227
|
+
* definition: {
|
|
228
|
+
* static: {
|
|
229
|
+
* description: "Grant members of janeFriends UserGroup access to the vacationFolder Album"
|
|
230
230
|
* }
|
|
231
231
|
* },
|
|
232
|
-
*
|
|
233
|
-
*
|
|
234
|
-
*
|
|
235
|
-
*
|
|
236
|
-
*
|
|
237
|
-
*
|
|
238
|
-
*
|
|
232
|
+
* lastUpdatedDate: "2024-08-12T18:20:50.99Z",
|
|
233
|
+
* policyId: "9wYxMpljbbZQb5fcZHyJhY",
|
|
234
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
235
|
+
* policyType: "STATIC",
|
|
236
|
+
* principal: {
|
|
237
|
+
* entityId: "janeFriends",
|
|
238
|
+
* entityType: "UserGroup"
|
|
239
239
|
* },
|
|
240
|
-
*
|
|
241
|
-
*
|
|
242
|
-
*
|
|
240
|
+
* resource: {
|
|
241
|
+
* entityId: "vacationFolder",
|
|
242
|
+
* entityType: "Album"
|
|
243
243
|
* }
|
|
244
244
|
* },
|
|
245
245
|
* {
|
|
246
|
-
*
|
|
247
|
-
*
|
|
248
|
-
*
|
|
249
|
-
*
|
|
246
|
+
* createdDate: "2024-08-12T18:20:50.99Z",
|
|
247
|
+
* definition: {
|
|
248
|
+
* static: {
|
|
249
|
+
* description: "Grant everyone access to the publicFolder Album"
|
|
250
250
|
* }
|
|
251
251
|
* },
|
|
252
|
-
*
|
|
253
|
-
*
|
|
254
|
-
*
|
|
255
|
-
*
|
|
256
|
-
*
|
|
257
|
-
*
|
|
258
|
-
*
|
|
252
|
+
* lastUpdatedDate: "2024-08-12T18:20:50.99Z",
|
|
253
|
+
* policyId: "Et9KxMplyaDdyurDw8TeFa",
|
|
254
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
255
|
+
* policyType: "STATIC",
|
|
256
|
+
* resource: {
|
|
257
|
+
* entityId: "publicFolder",
|
|
258
|
+
* entityType: "Album"
|
|
259
259
|
* }
|
|
260
260
|
* }
|
|
261
261
|
* ]
|
|
262
262
|
* }
|
|
263
263
|
* *\/
|
|
264
|
-
* // example id: example-1
|
|
265
264
|
* ```
|
|
266
265
|
*
|
|
267
266
|
* @example ListPolicies - Example 2
|
|
268
267
|
* ```javascript
|
|
269
268
|
* // The following example lists all policies for a specified principal.
|
|
270
269
|
* const input = {
|
|
271
|
-
*
|
|
272
|
-
*
|
|
273
|
-
*
|
|
274
|
-
*
|
|
275
|
-
*
|
|
270
|
+
* filter: {
|
|
271
|
+
* principal: {
|
|
272
|
+
* identifier: {
|
|
273
|
+
* entityId: "alice",
|
|
274
|
+
* entityType: "User"
|
|
276
275
|
* }
|
|
277
276
|
* }
|
|
278
277
|
* },
|
|
279
|
-
*
|
|
278
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a"
|
|
280
279
|
* };
|
|
281
280
|
* const command = new ListPoliciesCommand(input);
|
|
282
281
|
* const response = await client.send(command);
|
|
283
|
-
* /* response
|
|
282
|
+
* /* response is
|
|
284
283
|
* {
|
|
285
|
-
*
|
|
284
|
+
* policies: [
|
|
286
285
|
* {
|
|
287
|
-
*
|
|
288
|
-
*
|
|
289
|
-
*
|
|
290
|
-
*
|
|
286
|
+
* createdDate: "2022-12-09T22:55:16.067533Z",
|
|
287
|
+
* definition: {
|
|
288
|
+
* static: {
|
|
289
|
+
* description: "An example policy"
|
|
291
290
|
* }
|
|
292
291
|
* },
|
|
293
|
-
*
|
|
294
|
-
*
|
|
295
|
-
*
|
|
296
|
-
*
|
|
297
|
-
*
|
|
298
|
-
*
|
|
299
|
-
*
|
|
292
|
+
* lastUpdatedDate: "2022-12-09T22:55:16.067533Z",
|
|
293
|
+
* policyId: "Et9KxMplyaDdyurDw8TeFa",
|
|
294
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
295
|
+
* policyType: "STATIC",
|
|
296
|
+
* principal: {
|
|
297
|
+
* entityId: "alice",
|
|
298
|
+
* entityType: "User"
|
|
300
299
|
* },
|
|
301
|
-
*
|
|
302
|
-
*
|
|
303
|
-
*
|
|
300
|
+
* resource: {
|
|
301
|
+
* entityId: "bob_folder",
|
|
302
|
+
* entityType: "Album"
|
|
304
303
|
* }
|
|
305
304
|
* },
|
|
306
305
|
* {
|
|
307
|
-
*
|
|
308
|
-
*
|
|
309
|
-
*
|
|
306
|
+
* createdDate: "2022-12-09T23:00:24.66266Z",
|
|
307
|
+
* definition: {
|
|
308
|
+
* static: { /* empty *\/ }
|
|
310
309
|
* },
|
|
311
|
-
*
|
|
312
|
-
*
|
|
313
|
-
*
|
|
314
|
-
*
|
|
315
|
-
*
|
|
316
|
-
*
|
|
317
|
-
*
|
|
310
|
+
* lastUpdatedDate: "2022-12-09T23:00:24.66266Z",
|
|
311
|
+
* policyId: "9wYxMpljbbZQb5fcZHyJhY",
|
|
312
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
313
|
+
* policyType: "STATIC",
|
|
314
|
+
* principal: {
|
|
315
|
+
* entityId: "alice",
|
|
316
|
+
* entityType: "User"
|
|
318
317
|
* },
|
|
319
|
-
*
|
|
320
|
-
*
|
|
321
|
-
*
|
|
318
|
+
* resource: {
|
|
319
|
+
* entityId: "alice_folder",
|
|
320
|
+
* entityType: "Album"
|
|
322
321
|
* }
|
|
323
322
|
* }
|
|
324
323
|
* ]
|
|
325
324
|
* }
|
|
326
325
|
* *\/
|
|
327
|
-
* // example id: example-2
|
|
328
326
|
* ```
|
|
329
327
|
*
|
|
330
328
|
* @example ListPolicies - Example 3
|
|
331
329
|
* ```javascript
|
|
332
330
|
* // The following example uses the Filter parameter to list only the template-linked policies in the specified policy store.
|
|
333
331
|
* const input = {
|
|
334
|
-
*
|
|
335
|
-
*
|
|
332
|
+
* filter: {
|
|
333
|
+
* policyType: "TEMPLATE_LINKED"
|
|
336
334
|
* },
|
|
337
|
-
*
|
|
335
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a"
|
|
338
336
|
* };
|
|
339
337
|
* const command = new ListPoliciesCommand(input);
|
|
340
338
|
* const response = await client.send(command);
|
|
341
|
-
* /* response
|
|
339
|
+
* /* response is
|
|
342
340
|
* {
|
|
343
|
-
*
|
|
341
|
+
* policies: [
|
|
344
342
|
* {
|
|
345
|
-
*
|
|
346
|
-
*
|
|
347
|
-
*
|
|
348
|
-
*
|
|
349
|
-
*
|
|
350
|
-
*
|
|
351
|
-
*
|
|
343
|
+
* createdDate: "2023-06-13T16:03:07.620867Z",
|
|
344
|
+
* definition: {
|
|
345
|
+
* templateLinked: {
|
|
346
|
+
* policyTemplateId: "PTEXAMPLEabcdefg111111",
|
|
347
|
+
* principal: {
|
|
348
|
+
* entityId: "alice",
|
|
349
|
+
* entityType: "User"
|
|
352
350
|
* },
|
|
353
|
-
*
|
|
354
|
-
*
|
|
355
|
-
*
|
|
351
|
+
* resource: {
|
|
352
|
+
* entityId: "pic.jpg",
|
|
353
|
+
* entityType: "Photo"
|
|
356
354
|
* }
|
|
357
355
|
* }
|
|
358
356
|
* },
|
|
359
|
-
*
|
|
360
|
-
*
|
|
361
|
-
*
|
|
362
|
-
*
|
|
363
|
-
*
|
|
364
|
-
*
|
|
365
|
-
*
|
|
357
|
+
* lastUpdatedDate: "2023-06-13T16:03:07.620867Z",
|
|
358
|
+
* policyId: "9wYxMpljbbZQb5fcZHyJhY",
|
|
359
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
360
|
+
* policyType: "TEMPLATE_LINKED",
|
|
361
|
+
* principal: {
|
|
362
|
+
* entityId: "alice",
|
|
363
|
+
* entityType: "User"
|
|
366
364
|
* },
|
|
367
|
-
*
|
|
368
|
-
*
|
|
369
|
-
*
|
|
365
|
+
* resource: {
|
|
366
|
+
* entityId: "pic.jpg",
|
|
367
|
+
* entityType: "Photo"
|
|
370
368
|
* }
|
|
371
369
|
* }
|
|
372
370
|
* ]
|
|
373
371
|
* }
|
|
374
372
|
* *\/
|
|
375
|
-
* // example id: example-3
|
|
376
373
|
* ```
|
|
377
374
|
*
|
|
375
|
+
* @public
|
|
378
376
|
*/
|
|
379
377
|
export declare class ListPoliciesCommand extends ListPoliciesCommand_base {
|
|
380
378
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -157,32 +157,32 @@ declare const ListPolicyStoresCommand_base: {
|
|
|
157
157
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
158
158
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
159
159
|
*
|
|
160
|
-
*
|
|
160
|
+
*
|
|
161
161
|
* @example ListPolicyStores
|
|
162
162
|
* ```javascript
|
|
163
163
|
* // The following example lists all policy stores in the AWS account in the AWS Region in which you call the operation.
|
|
164
|
-
* const input = {};
|
|
164
|
+
* const input = { /* empty *\/ };
|
|
165
165
|
* const command = new ListPolicyStoresCommand(input);
|
|
166
166
|
* const response = await client.send(command);
|
|
167
|
-
* /* response
|
|
167
|
+
* /* response is
|
|
168
168
|
* {
|
|
169
|
-
*
|
|
169
|
+
* policyStores: [
|
|
170
170
|
* {
|
|
171
|
-
*
|
|
172
|
-
*
|
|
173
|
-
*
|
|
171
|
+
* arn: "arn:aws:verifiedpermissions::123456789012:policy-store/C7v5xMplfFH3i3e4Jrzb1a",
|
|
172
|
+
* createdDate: "2023-05-16T17:41:29.103459Z",
|
|
173
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a"
|
|
174
174
|
* },
|
|
175
175
|
* {
|
|
176
|
-
*
|
|
177
|
-
*
|
|
178
|
-
*
|
|
176
|
+
* arn: "arn:aws:verifiedpermissions::123456789012:policy-store/PSEXAMPLEabcdefg222222",
|
|
177
|
+
* createdDate: "2023-05-16T18:23:04.985521Z",
|
|
178
|
+
* policyStoreId: "PSEXAMPLEabcdefg222222"
|
|
179
179
|
* }
|
|
180
180
|
* ]
|
|
181
181
|
* }
|
|
182
182
|
* *\/
|
|
183
|
-
* // example id: example-1
|
|
184
183
|
* ```
|
|
185
184
|
*
|
|
185
|
+
* @public
|
|
186
186
|
*/
|
|
187
187
|
export declare class ListPolicyStoresCommand extends ListPolicyStoresCommand_base {
|
|
188
188
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -161,38 +161,38 @@ declare const ListPolicyTemplatesCommand_base: {
|
|
|
161
161
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
162
162
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
163
163
|
*
|
|
164
|
-
*
|
|
164
|
+
*
|
|
165
165
|
* @example ListPolicyTemplates
|
|
166
166
|
* ```javascript
|
|
167
167
|
* // The following example retrieves a list of all of the policy templates in the specified policy store.
|
|
168
168
|
* const input = {
|
|
169
|
-
*
|
|
169
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a"
|
|
170
170
|
* };
|
|
171
171
|
* const command = new ListPolicyTemplatesCommand(input);
|
|
172
172
|
* const response = await client.send(command);
|
|
173
|
-
* /* response
|
|
173
|
+
* /* response is
|
|
174
174
|
* {
|
|
175
|
-
*
|
|
175
|
+
* policyTemplates: [
|
|
176
176
|
* {
|
|
177
|
-
*
|
|
178
|
-
*
|
|
179
|
-
*
|
|
180
|
-
*
|
|
181
|
-
*
|
|
177
|
+
* createdDate: "2024-08-12T18:20:50.99Z",
|
|
178
|
+
* description: "Generic template",
|
|
179
|
+
* lastUpdatedDate: "2024-08-12T18:20:50.99Z",
|
|
180
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
181
|
+
* policyTemplateId: "PTEXAMPLEabcdefg111111"
|
|
182
182
|
* },
|
|
183
183
|
* {
|
|
184
|
-
*
|
|
185
|
-
*
|
|
186
|
-
*
|
|
187
|
-
*
|
|
188
|
-
*
|
|
184
|
+
* createdDate: "2024-08-12T18:20:50.99Z",
|
|
185
|
+
* description: "Template for research dept",
|
|
186
|
+
* lastUpdatedDate: "2024-08-12T18:20:50.99Z",
|
|
187
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
188
|
+
* policyTemplateId: "PTEXAMPLEabcdefg222222"
|
|
189
189
|
* }
|
|
190
190
|
* ]
|
|
191
191
|
* }
|
|
192
192
|
* *\/
|
|
193
|
-
* // example id: example-1
|
|
194
193
|
* ```
|
|
195
194
|
*
|
|
195
|
+
* @public
|
|
196
196
|
*/
|
|
197
197
|
export declare class ListPolicyTemplatesCommand extends ListPolicyTemplatesCommand_base {
|
|
198
198
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -175,36 +175,36 @@ declare const PutSchemaCommand_base: {
|
|
|
175
175
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
176
176
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
177
177
|
*
|
|
178
|
-
*
|
|
178
|
+
*
|
|
179
179
|
* @example PutSchema
|
|
180
180
|
* ```javascript
|
|
181
181
|
* // The following example creates a new schema, or updates an existing schema, in the specified policy store. Note that the schema text is shown line wrapped for readability. You should submit the entire schema text as a single line of text.
|
|
182
|
-
*
|
|
183
|
-
*
|
|
184
|
-
*
|
|
185
|
-
*
|
|
186
|
-
*
|
|
182
|
+
*
|
|
183
|
+
* Note
|
|
184
|
+
* The JSON in the parameters of this operation are strings that can contain embedded quotation marks (") within the outermost quotation mark pair. This requires that you stringify the JSON object by preceding all embedded quotation marks with a backslash character ( \" ) and combining all lines into a single text line with no line breaks.
|
|
185
|
+
*
|
|
186
|
+
* Example strings might be displayed wrapped across multiple lines here for readability, but the operation requires the parameters be submitted as single line strings.
|
|
187
187
|
* const input = {
|
|
188
|
-
*
|
|
189
|
-
*
|
|
188
|
+
* definition: {
|
|
189
|
+
* cedarJson: `{"MySampleNamespace": {"actions": {"remoteAccess": {"appliesTo": {"principalTypes": ["Employee"]}}},"entityTypes": {"Employee": {"shape": {"attributes": {"jobLevel": {"type": "Long"},"name": {"type": "String"}},"type": "Record"}}}}}`
|
|
190
190
|
* },
|
|
191
|
-
*
|
|
191
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a"
|
|
192
192
|
* };
|
|
193
193
|
* const command = new PutSchemaCommand(input);
|
|
194
194
|
* const response = await client.send(command);
|
|
195
|
-
* /* response
|
|
195
|
+
* /* response is
|
|
196
196
|
* {
|
|
197
|
-
*
|
|
198
|
-
*
|
|
199
|
-
*
|
|
197
|
+
* createdDate: "2023-06-13T19:28:06.003726Z",
|
|
198
|
+
* lastUpdatedDate: "2023-06-13T19:28:06.003726Z",
|
|
199
|
+
* namespaces: [
|
|
200
200
|
* "My::Sample::Namespace"
|
|
201
201
|
* ],
|
|
202
|
-
*
|
|
202
|
+
* policyStoreId: "C7v5xMplfFH3i3e4Jrzb1a"
|
|
203
203
|
* }
|
|
204
204
|
* *\/
|
|
205
|
-
* // example id: example-1
|
|
206
205
|
* ```
|
|
207
206
|
*
|
|
207
|
+
* @public
|
|
208
208
|
*/
|
|
209
209
|
export declare class PutSchemaCommand extends PutSchemaCommand_base {
|
|
210
210
|
/** @internal type navigation helper, not in runtime. */
|