@aws-sdk/client-verifiedpermissions 3.798.0 → 3.801.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +25 -65
- package/dist-cjs/index.js +158 -0
- package/dist-cjs/runtimeConfig.js +1 -0
- package/dist-es/VerifiedPermissions.js +6 -0
- package/dist-es/commands/ListTagsForResourceCommand.js +22 -0
- package/dist-es/commands/TagResourceCommand.js +22 -0
- package/dist-es/commands/UntagResourceCommand.js +22 -0
- package/dist-es/commands/index.js +3 -0
- package/dist-es/models/models_0.js +18 -0
- package/dist-es/protocols/Aws_json1_0.js +73 -1
- package/dist-es/runtimeConfig.js +2 -1
- package/dist-types/VerifiedPermissions.d.ts +22 -65
- package/dist-types/VerifiedPermissionsClient.d.ts +6 -67
- package/dist-types/commands/BatchGetPolicyCommand.d.ts +2 -88
- package/dist-types/commands/BatchIsAuthorizedCommand.d.ts +2 -103
- package/dist-types/commands/BatchIsAuthorizedWithTokenCommand.d.ts +2 -101
- package/dist-types/commands/CreateIdentitySourceCommand.d.ts +3 -121
- package/dist-types/commands/CreatePolicyCommand.d.ts +3 -111
- package/dist-types/commands/CreatePolicyStoreCommand.d.ts +6 -95
- package/dist-types/commands/CreatePolicyTemplateCommand.d.ts +3 -97
- package/dist-types/commands/DeleteIdentitySourceCommand.d.ts +3 -88
- package/dist-types/commands/DeletePolicyCommand.d.ts +3 -87
- package/dist-types/commands/DeletePolicyStoreCommand.d.ts +2 -85
- package/dist-types/commands/DeletePolicyTemplateCommand.d.ts +3 -90
- package/dist-types/commands/GetIdentitySourceCommand.d.ts +1 -82
- package/dist-types/commands/GetPolicyCommand.d.ts +1 -82
- package/dist-types/commands/GetPolicyStoreCommand.d.ts +6 -82
- package/dist-types/commands/GetPolicyTemplateCommand.d.ts +1 -82
- package/dist-types/commands/GetSchemaCommand.d.ts +1 -82
- package/dist-types/commands/IsAuthorizedCommand.d.ts +2 -88
- package/dist-types/commands/IsAuthorizedWithTokenCommand.d.ts +2 -96
- package/dist-types/commands/ListIdentitySourcesCommand.d.ts +1 -82
- package/dist-types/commands/ListPoliciesCommand.d.ts +1 -82
- package/dist-types/commands/ListPolicyStoresCommand.d.ts +1 -82
- package/dist-types/commands/ListPolicyTemplatesCommand.d.ts +1 -82
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +107 -0
- package/dist-types/commands/PutSchemaCommand.d.ts +3 -95
- package/dist-types/commands/TagResourceCommand.d.ts +108 -0
- package/dist-types/commands/UntagResourceCommand.d.ts +105 -0
- package/dist-types/commands/UpdateIdentitySourceCommand.d.ts +3 -92
- package/dist-types/commands/UpdatePolicyCommand.d.ts +3 -135
- package/dist-types/commands/UpdatePolicyStoreCommand.d.ts +3 -91
- package/dist-types/commands/UpdatePolicyTemplateCommand.d.ts +3 -97
- package/dist-types/commands/index.d.ts +3 -0
- package/dist-types/index.d.ts +1 -65
- package/dist-types/models/models_0.d.ts +385 -1235
- package/dist-types/protocols/Aws_json1_0.d.ts +27 -0
- package/dist-types/runtimeConfig.d.ts +1 -1
- package/dist-types/ts3.4/VerifiedPermissions.d.ts +51 -0
- package/dist-types/ts3.4/VerifiedPermissionsClient.d.ts +18 -0
- package/dist-types/ts3.4/commands/ListTagsForResourceCommand.d.ts +51 -0
- package/dist-types/ts3.4/commands/TagResourceCommand.d.ts +47 -0
- package/dist-types/ts3.4/commands/UntagResourceCommand.d.ts +47 -0
- package/dist-types/ts3.4/commands/index.d.ts +3 -0
- package/dist-types/ts3.4/models/models_0.d.ts +33 -0
- package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +36 -0
- package/dist-types/ts3.4/runtimeConfig.d.ts +1 -4
- package/package.json +5 -5
|
@@ -27,19 +27,7 @@ declare const CreatePolicyTemplateCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates a policy template. A template can use placeholders for the principal and resource. A
|
|
31
|
-
* template must be instantiated into a policy by associating it with specific principals
|
|
32
|
-
* and resources to use for the placeholders. That instantiated policy can then be
|
|
33
|
-
* considered in authorization decisions. The instantiated policy works identically to any
|
|
34
|
-
* other policy, except that it is dynamically linked to the template. If the template
|
|
35
|
-
* changes, then any policies that are linked to that template are immediately updated as
|
|
36
|
-
* well.</p>
|
|
37
|
-
* <note>
|
|
38
|
-
* <p>Verified Permissions is <i>
|
|
39
|
-
* <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a>
|
|
40
|
-
* </i>. It can take a few seconds for a new or changed element to propagate through
|
|
41
|
-
* the service and be visible in the results of other Verified Permissions operations.</p>
|
|
42
|
-
* </note>
|
|
30
|
+
* <p>Creates a policy template. A template can use placeholders for the principal and resource. A template must be instantiated into a policy by associating it with specific principals and resources to use for the placeholders. That instantiated policy can then be considered in authorization decisions. The instantiated policy works identically to any other policy, except that it is dynamically linked to the template. If the template changes, then any policies that are linked to that template are immediately updated as well.</p> <note> <p>Verified Permissions is <i> <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a> </i>. It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.</p> </note>
|
|
43
31
|
* @example
|
|
44
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
45
33
|
* ```javascript
|
|
@@ -70,8 +58,7 @@ declare const CreatePolicyTemplateCommand_base: {
|
|
|
70
58
|
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
71
59
|
*
|
|
72
60
|
* @throws {@link ConflictException} (client fault)
|
|
73
|
-
* <p>The request failed because another request to modify a resource occurred at the
|
|
74
|
-
* same.</p>
|
|
61
|
+
* <p>The request failed because another request to modify a resource occurred at the same.</p>
|
|
75
62
|
*
|
|
76
63
|
* @throws {@link ResourceNotFoundException} (client fault)
|
|
77
64
|
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
@@ -89,88 +76,7 @@ declare const CreatePolicyTemplateCommand_base: {
|
|
|
89
76
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
90
77
|
*
|
|
91
78
|
* @throws {@link ValidationException} (client fault)
|
|
92
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
93
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
94
|
-
* isn't valid.</p>
|
|
95
|
-
* <p>The possible reasons include the following:</p>
|
|
96
|
-
* <ul>
|
|
97
|
-
* <li>
|
|
98
|
-
* <p>
|
|
99
|
-
* <b>UnrecognizedEntityType</b>
|
|
100
|
-
* </p>
|
|
101
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
102
|
-
* </li>
|
|
103
|
-
* <li>
|
|
104
|
-
* <p>
|
|
105
|
-
* <b>UnrecognizedActionId</b>
|
|
106
|
-
* </p>
|
|
107
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
108
|
-
* </li>
|
|
109
|
-
* <li>
|
|
110
|
-
* <p>
|
|
111
|
-
* <b>InvalidActionApplication</b>
|
|
112
|
-
* </p>
|
|
113
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
114
|
-
* the specified principal and resource.</p>
|
|
115
|
-
* </li>
|
|
116
|
-
* <li>
|
|
117
|
-
* <p>
|
|
118
|
-
* <b>UnexpectedType</b>
|
|
119
|
-
* </p>
|
|
120
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
121
|
-
* operation.</p>
|
|
122
|
-
* </li>
|
|
123
|
-
* <li>
|
|
124
|
-
* <p>
|
|
125
|
-
* <b>IncompatibleTypes</b>
|
|
126
|
-
* </p>
|
|
127
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
128
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
129
|
-
* this context.</p>
|
|
130
|
-
* </li>
|
|
131
|
-
* <li>
|
|
132
|
-
* <p>
|
|
133
|
-
* <b>MissingAttribute</b>
|
|
134
|
-
* </p>
|
|
135
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
136
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
137
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
138
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
139
|
-
* </li>
|
|
140
|
-
* <li>
|
|
141
|
-
* <p>
|
|
142
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
143
|
-
* </p>
|
|
144
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
145
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
146
|
-
* first before attempting to access its value. For more information, see the
|
|
147
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
148
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
149
|
-
* </li>
|
|
150
|
-
* <li>
|
|
151
|
-
* <p>
|
|
152
|
-
* <b>ImpossiblePolicy</b>
|
|
153
|
-
* </p>
|
|
154
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
155
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
156
|
-
* affect an authorization decision.</p>
|
|
157
|
-
* </li>
|
|
158
|
-
* <li>
|
|
159
|
-
* <p>
|
|
160
|
-
* <b>WrongNumberArguments</b>
|
|
161
|
-
* </p>
|
|
162
|
-
* <p>The policy references an extension type with the wrong number of
|
|
163
|
-
* arguments.</p>
|
|
164
|
-
* </li>
|
|
165
|
-
* <li>
|
|
166
|
-
* <p>
|
|
167
|
-
* <b>FunctionArgumentValidationError</b>
|
|
168
|
-
* </p>
|
|
169
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
170
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
171
|
-
* period character.</p>
|
|
172
|
-
* </li>
|
|
173
|
-
* </ul>
|
|
79
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
174
80
|
*
|
|
175
81
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
176
82
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -27,10 +27,7 @@ declare const DeleteIdentitySourceCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Deletes an identity source that references an identity provider (IdP) such as Amazon Cognito. After
|
|
31
|
-
* you delete the identity source, you can no longer use tokens for identities from that identity source to
|
|
32
|
-
* represent principals in authorization queries made using <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_IsAuthorizedWithToken.html">IsAuthorizedWithToken</a>.
|
|
33
|
-
* operations.</p>
|
|
30
|
+
* <p>Deletes an identity source that references an identity provider (IdP) such as Amazon Cognito. After you delete the identity source, you can no longer use tokens for identities from that identity source to represent principals in authorization queries made using <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_IsAuthorizedWithToken.html">IsAuthorizedWithToken</a>. operations.</p>
|
|
34
31
|
* @example
|
|
35
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
36
33
|
* ```javascript
|
|
@@ -54,8 +51,7 @@ declare const DeleteIdentitySourceCommand_base: {
|
|
|
54
51
|
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
55
52
|
*
|
|
56
53
|
* @throws {@link ConflictException} (client fault)
|
|
57
|
-
* <p>The request failed because another request to modify a resource occurred at the
|
|
58
|
-
* same.</p>
|
|
54
|
+
* <p>The request failed because another request to modify a resource occurred at the same.</p>
|
|
59
55
|
*
|
|
60
56
|
* @throws {@link ResourceNotFoundException} (client fault)
|
|
61
57
|
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
@@ -70,88 +66,7 @@ declare const DeleteIdentitySourceCommand_base: {
|
|
|
70
66
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
71
67
|
*
|
|
72
68
|
* @throws {@link ValidationException} (client fault)
|
|
73
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
74
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
75
|
-
* isn't valid.</p>
|
|
76
|
-
* <p>The possible reasons include the following:</p>
|
|
77
|
-
* <ul>
|
|
78
|
-
* <li>
|
|
79
|
-
* <p>
|
|
80
|
-
* <b>UnrecognizedEntityType</b>
|
|
81
|
-
* </p>
|
|
82
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
83
|
-
* </li>
|
|
84
|
-
* <li>
|
|
85
|
-
* <p>
|
|
86
|
-
* <b>UnrecognizedActionId</b>
|
|
87
|
-
* </p>
|
|
88
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
89
|
-
* </li>
|
|
90
|
-
* <li>
|
|
91
|
-
* <p>
|
|
92
|
-
* <b>InvalidActionApplication</b>
|
|
93
|
-
* </p>
|
|
94
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
95
|
-
* the specified principal and resource.</p>
|
|
96
|
-
* </li>
|
|
97
|
-
* <li>
|
|
98
|
-
* <p>
|
|
99
|
-
* <b>UnexpectedType</b>
|
|
100
|
-
* </p>
|
|
101
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
102
|
-
* operation.</p>
|
|
103
|
-
* </li>
|
|
104
|
-
* <li>
|
|
105
|
-
* <p>
|
|
106
|
-
* <b>IncompatibleTypes</b>
|
|
107
|
-
* </p>
|
|
108
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
109
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
110
|
-
* this context.</p>
|
|
111
|
-
* </li>
|
|
112
|
-
* <li>
|
|
113
|
-
* <p>
|
|
114
|
-
* <b>MissingAttribute</b>
|
|
115
|
-
* </p>
|
|
116
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
117
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
118
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
119
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
120
|
-
* </li>
|
|
121
|
-
* <li>
|
|
122
|
-
* <p>
|
|
123
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
124
|
-
* </p>
|
|
125
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
126
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
127
|
-
* first before attempting to access its value. For more information, see the
|
|
128
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
129
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
130
|
-
* </li>
|
|
131
|
-
* <li>
|
|
132
|
-
* <p>
|
|
133
|
-
* <b>ImpossiblePolicy</b>
|
|
134
|
-
* </p>
|
|
135
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
136
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
137
|
-
* affect an authorization decision.</p>
|
|
138
|
-
* </li>
|
|
139
|
-
* <li>
|
|
140
|
-
* <p>
|
|
141
|
-
* <b>WrongNumberArguments</b>
|
|
142
|
-
* </p>
|
|
143
|
-
* <p>The policy references an extension type with the wrong number of
|
|
144
|
-
* arguments.</p>
|
|
145
|
-
* </li>
|
|
146
|
-
* <li>
|
|
147
|
-
* <p>
|
|
148
|
-
* <b>FunctionArgumentValidationError</b>
|
|
149
|
-
* </p>
|
|
150
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
151
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
152
|
-
* period character.</p>
|
|
153
|
-
* </li>
|
|
154
|
-
* </ul>
|
|
69
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
155
70
|
*
|
|
156
71
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
157
72
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -27,9 +27,7 @@ declare const DeletePolicyCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Deletes the specified policy from the policy store.</p>
|
|
31
|
-
* <p>This operation is idempotent; if you specify a policy that doesn't
|
|
32
|
-
* exist, the request response returns a successful <code>HTTP 200</code> status code.</p>
|
|
30
|
+
* <p>Deletes the specified policy from the policy store.</p> <p>This operation is idempotent; if you specify a policy that doesn't exist, the request response returns a successful <code>HTTP 200</code> status code.</p>
|
|
33
31
|
* @example
|
|
34
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
35
33
|
* ```javascript
|
|
@@ -53,8 +51,7 @@ declare const DeletePolicyCommand_base: {
|
|
|
53
51
|
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
54
52
|
*
|
|
55
53
|
* @throws {@link ConflictException} (client fault)
|
|
56
|
-
* <p>The request failed because another request to modify a resource occurred at the
|
|
57
|
-
* same.</p>
|
|
54
|
+
* <p>The request failed because another request to modify a resource occurred at the same.</p>
|
|
58
55
|
*
|
|
59
56
|
* @throws {@link ResourceNotFoundException} (client fault)
|
|
60
57
|
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
@@ -69,88 +66,7 @@ declare const DeletePolicyCommand_base: {
|
|
|
69
66
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
70
67
|
*
|
|
71
68
|
* @throws {@link ValidationException} (client fault)
|
|
72
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
73
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
74
|
-
* isn't valid.</p>
|
|
75
|
-
* <p>The possible reasons include the following:</p>
|
|
76
|
-
* <ul>
|
|
77
|
-
* <li>
|
|
78
|
-
* <p>
|
|
79
|
-
* <b>UnrecognizedEntityType</b>
|
|
80
|
-
* </p>
|
|
81
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
82
|
-
* </li>
|
|
83
|
-
* <li>
|
|
84
|
-
* <p>
|
|
85
|
-
* <b>UnrecognizedActionId</b>
|
|
86
|
-
* </p>
|
|
87
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
88
|
-
* </li>
|
|
89
|
-
* <li>
|
|
90
|
-
* <p>
|
|
91
|
-
* <b>InvalidActionApplication</b>
|
|
92
|
-
* </p>
|
|
93
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
94
|
-
* the specified principal and resource.</p>
|
|
95
|
-
* </li>
|
|
96
|
-
* <li>
|
|
97
|
-
* <p>
|
|
98
|
-
* <b>UnexpectedType</b>
|
|
99
|
-
* </p>
|
|
100
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
101
|
-
* operation.</p>
|
|
102
|
-
* </li>
|
|
103
|
-
* <li>
|
|
104
|
-
* <p>
|
|
105
|
-
* <b>IncompatibleTypes</b>
|
|
106
|
-
* </p>
|
|
107
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
108
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
109
|
-
* this context.</p>
|
|
110
|
-
* </li>
|
|
111
|
-
* <li>
|
|
112
|
-
* <p>
|
|
113
|
-
* <b>MissingAttribute</b>
|
|
114
|
-
* </p>
|
|
115
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
116
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
117
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
118
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
119
|
-
* </li>
|
|
120
|
-
* <li>
|
|
121
|
-
* <p>
|
|
122
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
123
|
-
* </p>
|
|
124
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
125
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
126
|
-
* first before attempting to access its value. For more information, see the
|
|
127
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
128
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
129
|
-
* </li>
|
|
130
|
-
* <li>
|
|
131
|
-
* <p>
|
|
132
|
-
* <b>ImpossiblePolicy</b>
|
|
133
|
-
* </p>
|
|
134
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
135
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
136
|
-
* affect an authorization decision.</p>
|
|
137
|
-
* </li>
|
|
138
|
-
* <li>
|
|
139
|
-
* <p>
|
|
140
|
-
* <b>WrongNumberArguments</b>
|
|
141
|
-
* </p>
|
|
142
|
-
* <p>The policy references an extension type with the wrong number of
|
|
143
|
-
* arguments.</p>
|
|
144
|
-
* </li>
|
|
145
|
-
* <li>
|
|
146
|
-
* <p>
|
|
147
|
-
* <b>FunctionArgumentValidationError</b>
|
|
148
|
-
* </p>
|
|
149
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
150
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
151
|
-
* period character.</p>
|
|
152
|
-
* </li>
|
|
153
|
-
* </ul>
|
|
69
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
154
70
|
*
|
|
155
71
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
156
72
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -27,9 +27,7 @@ declare const DeletePolicyStoreCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Deletes the specified policy store.</p>
|
|
31
|
-
* <p>This operation is idempotent. If you specify a policy store that does not exist, the request
|
|
32
|
-
* response will still return a successful HTTP 200 status code.</p>
|
|
30
|
+
* <p>Deletes the specified policy store.</p> <p>This operation is idempotent. If you specify a policy store that does not exist, the request response will still return a successful HTTP 200 status code.</p>
|
|
33
31
|
* @example
|
|
34
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
35
33
|
* ```javascript
|
|
@@ -64,88 +62,7 @@ declare const DeletePolicyStoreCommand_base: {
|
|
|
64
62
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
65
63
|
*
|
|
66
64
|
* @throws {@link ValidationException} (client fault)
|
|
67
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
68
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
69
|
-
* isn't valid.</p>
|
|
70
|
-
* <p>The possible reasons include the following:</p>
|
|
71
|
-
* <ul>
|
|
72
|
-
* <li>
|
|
73
|
-
* <p>
|
|
74
|
-
* <b>UnrecognizedEntityType</b>
|
|
75
|
-
* </p>
|
|
76
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
77
|
-
* </li>
|
|
78
|
-
* <li>
|
|
79
|
-
* <p>
|
|
80
|
-
* <b>UnrecognizedActionId</b>
|
|
81
|
-
* </p>
|
|
82
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
83
|
-
* </li>
|
|
84
|
-
* <li>
|
|
85
|
-
* <p>
|
|
86
|
-
* <b>InvalidActionApplication</b>
|
|
87
|
-
* </p>
|
|
88
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
89
|
-
* the specified principal and resource.</p>
|
|
90
|
-
* </li>
|
|
91
|
-
* <li>
|
|
92
|
-
* <p>
|
|
93
|
-
* <b>UnexpectedType</b>
|
|
94
|
-
* </p>
|
|
95
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
96
|
-
* operation.</p>
|
|
97
|
-
* </li>
|
|
98
|
-
* <li>
|
|
99
|
-
* <p>
|
|
100
|
-
* <b>IncompatibleTypes</b>
|
|
101
|
-
* </p>
|
|
102
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
103
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
104
|
-
* this context.</p>
|
|
105
|
-
* </li>
|
|
106
|
-
* <li>
|
|
107
|
-
* <p>
|
|
108
|
-
* <b>MissingAttribute</b>
|
|
109
|
-
* </p>
|
|
110
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
111
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
112
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
113
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
114
|
-
* </li>
|
|
115
|
-
* <li>
|
|
116
|
-
* <p>
|
|
117
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
118
|
-
* </p>
|
|
119
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
120
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
121
|
-
* first before attempting to access its value. For more information, see the
|
|
122
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
123
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
124
|
-
* </li>
|
|
125
|
-
* <li>
|
|
126
|
-
* <p>
|
|
127
|
-
* <b>ImpossiblePolicy</b>
|
|
128
|
-
* </p>
|
|
129
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
130
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
131
|
-
* affect an authorization decision.</p>
|
|
132
|
-
* </li>
|
|
133
|
-
* <li>
|
|
134
|
-
* <p>
|
|
135
|
-
* <b>WrongNumberArguments</b>
|
|
136
|
-
* </p>
|
|
137
|
-
* <p>The policy references an extension type with the wrong number of
|
|
138
|
-
* arguments.</p>
|
|
139
|
-
* </li>
|
|
140
|
-
* <li>
|
|
141
|
-
* <p>
|
|
142
|
-
* <b>FunctionArgumentValidationError</b>
|
|
143
|
-
* </p>
|
|
144
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
145
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
146
|
-
* period character.</p>
|
|
147
|
-
* </li>
|
|
148
|
-
* </ul>
|
|
65
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
149
66
|
*
|
|
150
67
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
151
68
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -27,12 +27,7 @@ declare const DeletePolicyTemplateCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Deletes the specified policy template from the policy store.</p>
|
|
31
|
-
* <important>
|
|
32
|
-
* <p>This operation also deletes any policies that were created from the specified
|
|
33
|
-
* policy template. Those policies are immediately removed from all future API responses, and are
|
|
34
|
-
* asynchronously deleted from the policy store.</p>
|
|
35
|
-
* </important>
|
|
30
|
+
* <p>Deletes the specified policy template from the policy store.</p> <important> <p>This operation also deletes any policies that were created from the specified policy template. Those policies are immediately removed from all future API responses, and are asynchronously deleted from the policy store.</p> </important>
|
|
36
31
|
* @example
|
|
37
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
38
33
|
* ```javascript
|
|
@@ -56,8 +51,7 @@ declare const DeletePolicyTemplateCommand_base: {
|
|
|
56
51
|
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
57
52
|
*
|
|
58
53
|
* @throws {@link ConflictException} (client fault)
|
|
59
|
-
* <p>The request failed because another request to modify a resource occurred at the
|
|
60
|
-
* same.</p>
|
|
54
|
+
* <p>The request failed because another request to modify a resource occurred at the same.</p>
|
|
61
55
|
*
|
|
62
56
|
* @throws {@link ResourceNotFoundException} (client fault)
|
|
63
57
|
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
@@ -72,88 +66,7 @@ declare const DeletePolicyTemplateCommand_base: {
|
|
|
72
66
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
73
67
|
*
|
|
74
68
|
* @throws {@link ValidationException} (client fault)
|
|
75
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
76
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
77
|
-
* isn't valid.</p>
|
|
78
|
-
* <p>The possible reasons include the following:</p>
|
|
79
|
-
* <ul>
|
|
80
|
-
* <li>
|
|
81
|
-
* <p>
|
|
82
|
-
* <b>UnrecognizedEntityType</b>
|
|
83
|
-
* </p>
|
|
84
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
85
|
-
* </li>
|
|
86
|
-
* <li>
|
|
87
|
-
* <p>
|
|
88
|
-
* <b>UnrecognizedActionId</b>
|
|
89
|
-
* </p>
|
|
90
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
91
|
-
* </li>
|
|
92
|
-
* <li>
|
|
93
|
-
* <p>
|
|
94
|
-
* <b>InvalidActionApplication</b>
|
|
95
|
-
* </p>
|
|
96
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
97
|
-
* the specified principal and resource.</p>
|
|
98
|
-
* </li>
|
|
99
|
-
* <li>
|
|
100
|
-
* <p>
|
|
101
|
-
* <b>UnexpectedType</b>
|
|
102
|
-
* </p>
|
|
103
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
104
|
-
* operation.</p>
|
|
105
|
-
* </li>
|
|
106
|
-
* <li>
|
|
107
|
-
* <p>
|
|
108
|
-
* <b>IncompatibleTypes</b>
|
|
109
|
-
* </p>
|
|
110
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
111
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
112
|
-
* this context.</p>
|
|
113
|
-
* </li>
|
|
114
|
-
* <li>
|
|
115
|
-
* <p>
|
|
116
|
-
* <b>MissingAttribute</b>
|
|
117
|
-
* </p>
|
|
118
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
119
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
120
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
121
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
122
|
-
* </li>
|
|
123
|
-
* <li>
|
|
124
|
-
* <p>
|
|
125
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
126
|
-
* </p>
|
|
127
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
128
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
129
|
-
* first before attempting to access its value. For more information, see the
|
|
130
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
131
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
132
|
-
* </li>
|
|
133
|
-
* <li>
|
|
134
|
-
* <p>
|
|
135
|
-
* <b>ImpossiblePolicy</b>
|
|
136
|
-
* </p>
|
|
137
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
138
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
139
|
-
* affect an authorization decision.</p>
|
|
140
|
-
* </li>
|
|
141
|
-
* <li>
|
|
142
|
-
* <p>
|
|
143
|
-
* <b>WrongNumberArguments</b>
|
|
144
|
-
* </p>
|
|
145
|
-
* <p>The policy references an extension type with the wrong number of
|
|
146
|
-
* arguments.</p>
|
|
147
|
-
* </li>
|
|
148
|
-
* <li>
|
|
149
|
-
* <p>
|
|
150
|
-
* <b>FunctionArgumentValidationError</b>
|
|
151
|
-
* </p>
|
|
152
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
153
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
154
|
-
* period character.</p>
|
|
155
|
-
* </li>
|
|
156
|
-
* </ul>
|
|
69
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
157
70
|
*
|
|
158
71
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
159
72
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|