@aws-sdk/client-verifiedpermissions 3.798.0 → 3.801.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +25 -65
- package/dist-cjs/index.js +158 -0
- package/dist-cjs/runtimeConfig.js +1 -0
- package/dist-es/VerifiedPermissions.js +6 -0
- package/dist-es/commands/ListTagsForResourceCommand.js +22 -0
- package/dist-es/commands/TagResourceCommand.js +22 -0
- package/dist-es/commands/UntagResourceCommand.js +22 -0
- package/dist-es/commands/index.js +3 -0
- package/dist-es/models/models_0.js +18 -0
- package/dist-es/protocols/Aws_json1_0.js +73 -1
- package/dist-es/runtimeConfig.js +2 -1
- package/dist-types/VerifiedPermissions.d.ts +22 -65
- package/dist-types/VerifiedPermissionsClient.d.ts +6 -67
- package/dist-types/commands/BatchGetPolicyCommand.d.ts +2 -88
- package/dist-types/commands/BatchIsAuthorizedCommand.d.ts +2 -103
- package/dist-types/commands/BatchIsAuthorizedWithTokenCommand.d.ts +2 -101
- package/dist-types/commands/CreateIdentitySourceCommand.d.ts +3 -121
- package/dist-types/commands/CreatePolicyCommand.d.ts +3 -111
- package/dist-types/commands/CreatePolicyStoreCommand.d.ts +6 -95
- package/dist-types/commands/CreatePolicyTemplateCommand.d.ts +3 -97
- package/dist-types/commands/DeleteIdentitySourceCommand.d.ts +3 -88
- package/dist-types/commands/DeletePolicyCommand.d.ts +3 -87
- package/dist-types/commands/DeletePolicyStoreCommand.d.ts +2 -85
- package/dist-types/commands/DeletePolicyTemplateCommand.d.ts +3 -90
- package/dist-types/commands/GetIdentitySourceCommand.d.ts +1 -82
- package/dist-types/commands/GetPolicyCommand.d.ts +1 -82
- package/dist-types/commands/GetPolicyStoreCommand.d.ts +6 -82
- package/dist-types/commands/GetPolicyTemplateCommand.d.ts +1 -82
- package/dist-types/commands/GetSchemaCommand.d.ts +1 -82
- package/dist-types/commands/IsAuthorizedCommand.d.ts +2 -88
- package/dist-types/commands/IsAuthorizedWithTokenCommand.d.ts +2 -96
- package/dist-types/commands/ListIdentitySourcesCommand.d.ts +1 -82
- package/dist-types/commands/ListPoliciesCommand.d.ts +1 -82
- package/dist-types/commands/ListPolicyStoresCommand.d.ts +1 -82
- package/dist-types/commands/ListPolicyTemplatesCommand.d.ts +1 -82
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +107 -0
- package/dist-types/commands/PutSchemaCommand.d.ts +3 -95
- package/dist-types/commands/TagResourceCommand.d.ts +108 -0
- package/dist-types/commands/UntagResourceCommand.d.ts +105 -0
- package/dist-types/commands/UpdateIdentitySourceCommand.d.ts +3 -92
- package/dist-types/commands/UpdatePolicyCommand.d.ts +3 -135
- package/dist-types/commands/UpdatePolicyStoreCommand.d.ts +3 -91
- package/dist-types/commands/UpdatePolicyTemplateCommand.d.ts +3 -97
- package/dist-types/commands/index.d.ts +3 -0
- package/dist-types/index.d.ts +1 -65
- package/dist-types/models/models_0.d.ts +385 -1235
- package/dist-types/protocols/Aws_json1_0.d.ts +27 -0
- package/dist-types/runtimeConfig.d.ts +1 -1
- package/dist-types/ts3.4/VerifiedPermissions.d.ts +51 -0
- package/dist-types/ts3.4/VerifiedPermissionsClient.d.ts +18 -0
- package/dist-types/ts3.4/commands/ListTagsForResourceCommand.d.ts +51 -0
- package/dist-types/ts3.4/commands/TagResourceCommand.d.ts +47 -0
- package/dist-types/ts3.4/commands/UntagResourceCommand.d.ts +47 -0
- package/dist-types/ts3.4/commands/index.d.ts +3 -0
- package/dist-types/ts3.4/models/models_0.d.ts +33 -0
- package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +36 -0
- package/dist-types/ts3.4/runtimeConfig.d.ts +1 -4
- package/package.json +5 -5
|
@@ -109,88 +109,7 @@ declare const GetIdentitySourceCommand_base: {
|
|
|
109
109
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
110
110
|
*
|
|
111
111
|
* @throws {@link ValidationException} (client fault)
|
|
112
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
113
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
114
|
-
* isn't valid.</p>
|
|
115
|
-
* <p>The possible reasons include the following:</p>
|
|
116
|
-
* <ul>
|
|
117
|
-
* <li>
|
|
118
|
-
* <p>
|
|
119
|
-
* <b>UnrecognizedEntityType</b>
|
|
120
|
-
* </p>
|
|
121
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
122
|
-
* </li>
|
|
123
|
-
* <li>
|
|
124
|
-
* <p>
|
|
125
|
-
* <b>UnrecognizedActionId</b>
|
|
126
|
-
* </p>
|
|
127
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
128
|
-
* </li>
|
|
129
|
-
* <li>
|
|
130
|
-
* <p>
|
|
131
|
-
* <b>InvalidActionApplication</b>
|
|
132
|
-
* </p>
|
|
133
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
134
|
-
* the specified principal and resource.</p>
|
|
135
|
-
* </li>
|
|
136
|
-
* <li>
|
|
137
|
-
* <p>
|
|
138
|
-
* <b>UnexpectedType</b>
|
|
139
|
-
* </p>
|
|
140
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
141
|
-
* operation.</p>
|
|
142
|
-
* </li>
|
|
143
|
-
* <li>
|
|
144
|
-
* <p>
|
|
145
|
-
* <b>IncompatibleTypes</b>
|
|
146
|
-
* </p>
|
|
147
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
148
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
149
|
-
* this context.</p>
|
|
150
|
-
* </li>
|
|
151
|
-
* <li>
|
|
152
|
-
* <p>
|
|
153
|
-
* <b>MissingAttribute</b>
|
|
154
|
-
* </p>
|
|
155
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
156
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
157
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
158
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
159
|
-
* </li>
|
|
160
|
-
* <li>
|
|
161
|
-
* <p>
|
|
162
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
163
|
-
* </p>
|
|
164
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
165
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
166
|
-
* first before attempting to access its value. For more information, see the
|
|
167
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
168
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
169
|
-
* </li>
|
|
170
|
-
* <li>
|
|
171
|
-
* <p>
|
|
172
|
-
* <b>ImpossiblePolicy</b>
|
|
173
|
-
* </p>
|
|
174
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
175
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
176
|
-
* affect an authorization decision.</p>
|
|
177
|
-
* </li>
|
|
178
|
-
* <li>
|
|
179
|
-
* <p>
|
|
180
|
-
* <b>WrongNumberArguments</b>
|
|
181
|
-
* </p>
|
|
182
|
-
* <p>The policy references an extension type with the wrong number of
|
|
183
|
-
* arguments.</p>
|
|
184
|
-
* </li>
|
|
185
|
-
* <li>
|
|
186
|
-
* <p>
|
|
187
|
-
* <b>FunctionArgumentValidationError</b>
|
|
188
|
-
* </p>
|
|
189
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
190
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
191
|
-
* period character.</p>
|
|
192
|
-
* </li>
|
|
193
|
-
* </ul>
|
|
112
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
194
113
|
*
|
|
195
114
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
196
115
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -101,88 +101,7 @@ declare const GetPolicyCommand_base: {
|
|
|
101
101
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
102
102
|
*
|
|
103
103
|
* @throws {@link ValidationException} (client fault)
|
|
104
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
105
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
106
|
-
* isn't valid.</p>
|
|
107
|
-
* <p>The possible reasons include the following:</p>
|
|
108
|
-
* <ul>
|
|
109
|
-
* <li>
|
|
110
|
-
* <p>
|
|
111
|
-
* <b>UnrecognizedEntityType</b>
|
|
112
|
-
* </p>
|
|
113
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
114
|
-
* </li>
|
|
115
|
-
* <li>
|
|
116
|
-
* <p>
|
|
117
|
-
* <b>UnrecognizedActionId</b>
|
|
118
|
-
* </p>
|
|
119
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
120
|
-
* </li>
|
|
121
|
-
* <li>
|
|
122
|
-
* <p>
|
|
123
|
-
* <b>InvalidActionApplication</b>
|
|
124
|
-
* </p>
|
|
125
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
126
|
-
* the specified principal and resource.</p>
|
|
127
|
-
* </li>
|
|
128
|
-
* <li>
|
|
129
|
-
* <p>
|
|
130
|
-
* <b>UnexpectedType</b>
|
|
131
|
-
* </p>
|
|
132
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
133
|
-
* operation.</p>
|
|
134
|
-
* </li>
|
|
135
|
-
* <li>
|
|
136
|
-
* <p>
|
|
137
|
-
* <b>IncompatibleTypes</b>
|
|
138
|
-
* </p>
|
|
139
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
140
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
141
|
-
* this context.</p>
|
|
142
|
-
* </li>
|
|
143
|
-
* <li>
|
|
144
|
-
* <p>
|
|
145
|
-
* <b>MissingAttribute</b>
|
|
146
|
-
* </p>
|
|
147
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
148
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
149
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
150
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
151
|
-
* </li>
|
|
152
|
-
* <li>
|
|
153
|
-
* <p>
|
|
154
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
155
|
-
* </p>
|
|
156
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
157
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
158
|
-
* first before attempting to access its value. For more information, see the
|
|
159
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
160
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
161
|
-
* </li>
|
|
162
|
-
* <li>
|
|
163
|
-
* <p>
|
|
164
|
-
* <b>ImpossiblePolicy</b>
|
|
165
|
-
* </p>
|
|
166
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
167
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
168
|
-
* affect an authorization decision.</p>
|
|
169
|
-
* </li>
|
|
170
|
-
* <li>
|
|
171
|
-
* <p>
|
|
172
|
-
* <b>WrongNumberArguments</b>
|
|
173
|
-
* </p>
|
|
174
|
-
* <p>The policy references an extension type with the wrong number of
|
|
175
|
-
* arguments.</p>
|
|
176
|
-
* </li>
|
|
177
|
-
* <li>
|
|
178
|
-
* <p>
|
|
179
|
-
* <b>FunctionArgumentValidationError</b>
|
|
180
|
-
* </p>
|
|
181
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
182
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
183
|
-
* period character.</p>
|
|
184
|
-
* </li>
|
|
185
|
-
* </ul>
|
|
104
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
186
105
|
*
|
|
187
106
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
188
107
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -36,6 +36,7 @@ declare const GetPolicyStoreCommand_base: {
|
|
|
36
36
|
* const client = new VerifiedPermissionsClient(config);
|
|
37
37
|
* const input = { // GetPolicyStoreInput
|
|
38
38
|
* policyStoreId: "STRING_VALUE", // required
|
|
39
|
+
* tags: true || false,
|
|
39
40
|
* };
|
|
40
41
|
* const command = new GetPolicyStoreCommand(input);
|
|
41
42
|
* const response = await client.send(command);
|
|
@@ -49,6 +50,10 @@ declare const GetPolicyStoreCommand_base: {
|
|
|
49
50
|
* // lastUpdatedDate: new Date("TIMESTAMP"), // required
|
|
50
51
|
* // description: "STRING_VALUE",
|
|
51
52
|
* // deletionProtection: "ENABLED" || "DISABLED",
|
|
53
|
+
* // cedarVersion: "CEDAR_2" || "CEDAR_4",
|
|
54
|
+
* // tags: { // TagMap
|
|
55
|
+
* // "<keys>": "STRING_VALUE",
|
|
56
|
+
* // },
|
|
52
57
|
* // };
|
|
53
58
|
*
|
|
54
59
|
* ```
|
|
@@ -72,88 +77,7 @@ declare const GetPolicyStoreCommand_base: {
|
|
|
72
77
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
73
78
|
*
|
|
74
79
|
* @throws {@link ValidationException} (client fault)
|
|
75
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
76
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
77
|
-
* isn't valid.</p>
|
|
78
|
-
* <p>The possible reasons include the following:</p>
|
|
79
|
-
* <ul>
|
|
80
|
-
* <li>
|
|
81
|
-
* <p>
|
|
82
|
-
* <b>UnrecognizedEntityType</b>
|
|
83
|
-
* </p>
|
|
84
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
85
|
-
* </li>
|
|
86
|
-
* <li>
|
|
87
|
-
* <p>
|
|
88
|
-
* <b>UnrecognizedActionId</b>
|
|
89
|
-
* </p>
|
|
90
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
91
|
-
* </li>
|
|
92
|
-
* <li>
|
|
93
|
-
* <p>
|
|
94
|
-
* <b>InvalidActionApplication</b>
|
|
95
|
-
* </p>
|
|
96
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
97
|
-
* the specified principal and resource.</p>
|
|
98
|
-
* </li>
|
|
99
|
-
* <li>
|
|
100
|
-
* <p>
|
|
101
|
-
* <b>UnexpectedType</b>
|
|
102
|
-
* </p>
|
|
103
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
104
|
-
* operation.</p>
|
|
105
|
-
* </li>
|
|
106
|
-
* <li>
|
|
107
|
-
* <p>
|
|
108
|
-
* <b>IncompatibleTypes</b>
|
|
109
|
-
* </p>
|
|
110
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
111
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
112
|
-
* this context.</p>
|
|
113
|
-
* </li>
|
|
114
|
-
* <li>
|
|
115
|
-
* <p>
|
|
116
|
-
* <b>MissingAttribute</b>
|
|
117
|
-
* </p>
|
|
118
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
119
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
120
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
121
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
122
|
-
* </li>
|
|
123
|
-
* <li>
|
|
124
|
-
* <p>
|
|
125
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
126
|
-
* </p>
|
|
127
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
128
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
129
|
-
* first before attempting to access its value. For more information, see the
|
|
130
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
131
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
132
|
-
* </li>
|
|
133
|
-
* <li>
|
|
134
|
-
* <p>
|
|
135
|
-
* <b>ImpossiblePolicy</b>
|
|
136
|
-
* </p>
|
|
137
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
138
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
139
|
-
* affect an authorization decision.</p>
|
|
140
|
-
* </li>
|
|
141
|
-
* <li>
|
|
142
|
-
* <p>
|
|
143
|
-
* <b>WrongNumberArguments</b>
|
|
144
|
-
* </p>
|
|
145
|
-
* <p>The policy references an extension type with the wrong number of
|
|
146
|
-
* arguments.</p>
|
|
147
|
-
* </li>
|
|
148
|
-
* <li>
|
|
149
|
-
* <p>
|
|
150
|
-
* <b>FunctionArgumentValidationError</b>
|
|
151
|
-
* </p>
|
|
152
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
153
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
154
|
-
* period character.</p>
|
|
155
|
-
* </li>
|
|
156
|
-
* </ul>
|
|
80
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
157
81
|
*
|
|
158
82
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
159
83
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -70,88 +70,7 @@ declare const GetPolicyTemplateCommand_base: {
|
|
|
70
70
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
71
71
|
*
|
|
72
72
|
* @throws {@link ValidationException} (client fault)
|
|
73
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
74
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
75
|
-
* isn't valid.</p>
|
|
76
|
-
* <p>The possible reasons include the following:</p>
|
|
77
|
-
* <ul>
|
|
78
|
-
* <li>
|
|
79
|
-
* <p>
|
|
80
|
-
* <b>UnrecognizedEntityType</b>
|
|
81
|
-
* </p>
|
|
82
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
83
|
-
* </li>
|
|
84
|
-
* <li>
|
|
85
|
-
* <p>
|
|
86
|
-
* <b>UnrecognizedActionId</b>
|
|
87
|
-
* </p>
|
|
88
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
89
|
-
* </li>
|
|
90
|
-
* <li>
|
|
91
|
-
* <p>
|
|
92
|
-
* <b>InvalidActionApplication</b>
|
|
93
|
-
* </p>
|
|
94
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
95
|
-
* the specified principal and resource.</p>
|
|
96
|
-
* </li>
|
|
97
|
-
* <li>
|
|
98
|
-
* <p>
|
|
99
|
-
* <b>UnexpectedType</b>
|
|
100
|
-
* </p>
|
|
101
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
102
|
-
* operation.</p>
|
|
103
|
-
* </li>
|
|
104
|
-
* <li>
|
|
105
|
-
* <p>
|
|
106
|
-
* <b>IncompatibleTypes</b>
|
|
107
|
-
* </p>
|
|
108
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
109
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
110
|
-
* this context.</p>
|
|
111
|
-
* </li>
|
|
112
|
-
* <li>
|
|
113
|
-
* <p>
|
|
114
|
-
* <b>MissingAttribute</b>
|
|
115
|
-
* </p>
|
|
116
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
117
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
118
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
119
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
120
|
-
* </li>
|
|
121
|
-
* <li>
|
|
122
|
-
* <p>
|
|
123
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
124
|
-
* </p>
|
|
125
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
126
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
127
|
-
* first before attempting to access its value. For more information, see the
|
|
128
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
129
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
130
|
-
* </li>
|
|
131
|
-
* <li>
|
|
132
|
-
* <p>
|
|
133
|
-
* <b>ImpossiblePolicy</b>
|
|
134
|
-
* </p>
|
|
135
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
136
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
137
|
-
* affect an authorization decision.</p>
|
|
138
|
-
* </li>
|
|
139
|
-
* <li>
|
|
140
|
-
* <p>
|
|
141
|
-
* <b>WrongNumberArguments</b>
|
|
142
|
-
* </p>
|
|
143
|
-
* <p>The policy references an extension type with the wrong number of
|
|
144
|
-
* arguments.</p>
|
|
145
|
-
* </li>
|
|
146
|
-
* <li>
|
|
147
|
-
* <p>
|
|
148
|
-
* <b>FunctionArgumentValidationError</b>
|
|
149
|
-
* </p>
|
|
150
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
151
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
152
|
-
* period character.</p>
|
|
153
|
-
* </li>
|
|
154
|
-
* </ul>
|
|
73
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
155
74
|
*
|
|
156
75
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
157
76
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -70,88 +70,7 @@ declare const GetSchemaCommand_base: {
|
|
|
70
70
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
71
71
|
*
|
|
72
72
|
* @throws {@link ValidationException} (client fault)
|
|
73
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
74
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
75
|
-
* isn't valid.</p>
|
|
76
|
-
* <p>The possible reasons include the following:</p>
|
|
77
|
-
* <ul>
|
|
78
|
-
* <li>
|
|
79
|
-
* <p>
|
|
80
|
-
* <b>UnrecognizedEntityType</b>
|
|
81
|
-
* </p>
|
|
82
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
83
|
-
* </li>
|
|
84
|
-
* <li>
|
|
85
|
-
* <p>
|
|
86
|
-
* <b>UnrecognizedActionId</b>
|
|
87
|
-
* </p>
|
|
88
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
89
|
-
* </li>
|
|
90
|
-
* <li>
|
|
91
|
-
* <p>
|
|
92
|
-
* <b>InvalidActionApplication</b>
|
|
93
|
-
* </p>
|
|
94
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
95
|
-
* the specified principal and resource.</p>
|
|
96
|
-
* </li>
|
|
97
|
-
* <li>
|
|
98
|
-
* <p>
|
|
99
|
-
* <b>UnexpectedType</b>
|
|
100
|
-
* </p>
|
|
101
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
102
|
-
* operation.</p>
|
|
103
|
-
* </li>
|
|
104
|
-
* <li>
|
|
105
|
-
* <p>
|
|
106
|
-
* <b>IncompatibleTypes</b>
|
|
107
|
-
* </p>
|
|
108
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
109
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
110
|
-
* this context.</p>
|
|
111
|
-
* </li>
|
|
112
|
-
* <li>
|
|
113
|
-
* <p>
|
|
114
|
-
* <b>MissingAttribute</b>
|
|
115
|
-
* </p>
|
|
116
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
117
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
118
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
119
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
120
|
-
* </li>
|
|
121
|
-
* <li>
|
|
122
|
-
* <p>
|
|
123
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
124
|
-
* </p>
|
|
125
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
126
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
127
|
-
* first before attempting to access its value. For more information, see the
|
|
128
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
129
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
130
|
-
* </li>
|
|
131
|
-
* <li>
|
|
132
|
-
* <p>
|
|
133
|
-
* <b>ImpossiblePolicy</b>
|
|
134
|
-
* </p>
|
|
135
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
136
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
137
|
-
* affect an authorization decision.</p>
|
|
138
|
-
* </li>
|
|
139
|
-
* <li>
|
|
140
|
-
* <p>
|
|
141
|
-
* <b>WrongNumberArguments</b>
|
|
142
|
-
* </p>
|
|
143
|
-
* <p>The policy references an extension type with the wrong number of
|
|
144
|
-
* arguments.</p>
|
|
145
|
-
* </li>
|
|
146
|
-
* <li>
|
|
147
|
-
* <p>
|
|
148
|
-
* <b>FunctionArgumentValidationError</b>
|
|
149
|
-
* </p>
|
|
150
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
151
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
152
|
-
* period character.</p>
|
|
153
|
-
* </li>
|
|
154
|
-
* </ul>
|
|
73
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
155
74
|
*
|
|
156
75
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
157
76
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -27,12 +27,7 @@ declare const IsAuthorizedCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Makes an authorization decision about a service request described in the parameters.
|
|
31
|
-
* The information in the parameters can also define additional context that Verified Permissions can
|
|
32
|
-
* include in the evaluation. The request is evaluated against all matching policies in the
|
|
33
|
-
* specified policy store. The result of the decision is either <code>Allow</code> or
|
|
34
|
-
* <code>Deny</code>, along with a list of the policies that resulted in the
|
|
35
|
-
* decision.</p>
|
|
30
|
+
* <p>Makes an authorization decision about a service request described in the parameters. The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either <code>Allow</code> or <code>Deny</code>, along with a list of the policies that resulted in the decision.</p>
|
|
36
31
|
* @example
|
|
37
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
38
33
|
* ```javascript
|
|
@@ -140,88 +135,7 @@ declare const IsAuthorizedCommand_base: {
|
|
|
140
135
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
141
136
|
*
|
|
142
137
|
* @throws {@link ValidationException} (client fault)
|
|
143
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
144
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
145
|
-
* isn't valid.</p>
|
|
146
|
-
* <p>The possible reasons include the following:</p>
|
|
147
|
-
* <ul>
|
|
148
|
-
* <li>
|
|
149
|
-
* <p>
|
|
150
|
-
* <b>UnrecognizedEntityType</b>
|
|
151
|
-
* </p>
|
|
152
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
153
|
-
* </li>
|
|
154
|
-
* <li>
|
|
155
|
-
* <p>
|
|
156
|
-
* <b>UnrecognizedActionId</b>
|
|
157
|
-
* </p>
|
|
158
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
159
|
-
* </li>
|
|
160
|
-
* <li>
|
|
161
|
-
* <p>
|
|
162
|
-
* <b>InvalidActionApplication</b>
|
|
163
|
-
* </p>
|
|
164
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
165
|
-
* the specified principal and resource.</p>
|
|
166
|
-
* </li>
|
|
167
|
-
* <li>
|
|
168
|
-
* <p>
|
|
169
|
-
* <b>UnexpectedType</b>
|
|
170
|
-
* </p>
|
|
171
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
172
|
-
* operation.</p>
|
|
173
|
-
* </li>
|
|
174
|
-
* <li>
|
|
175
|
-
* <p>
|
|
176
|
-
* <b>IncompatibleTypes</b>
|
|
177
|
-
* </p>
|
|
178
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
179
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
180
|
-
* this context.</p>
|
|
181
|
-
* </li>
|
|
182
|
-
* <li>
|
|
183
|
-
* <p>
|
|
184
|
-
* <b>MissingAttribute</b>
|
|
185
|
-
* </p>
|
|
186
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
187
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
188
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
189
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
190
|
-
* </li>
|
|
191
|
-
* <li>
|
|
192
|
-
* <p>
|
|
193
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
194
|
-
* </p>
|
|
195
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
196
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
197
|
-
* first before attempting to access its value. For more information, see the
|
|
198
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
199
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
200
|
-
* </li>
|
|
201
|
-
* <li>
|
|
202
|
-
* <p>
|
|
203
|
-
* <b>ImpossiblePolicy</b>
|
|
204
|
-
* </p>
|
|
205
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
206
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
207
|
-
* affect an authorization decision.</p>
|
|
208
|
-
* </li>
|
|
209
|
-
* <li>
|
|
210
|
-
* <p>
|
|
211
|
-
* <b>WrongNumberArguments</b>
|
|
212
|
-
* </p>
|
|
213
|
-
* <p>The policy references an extension type with the wrong number of
|
|
214
|
-
* arguments.</p>
|
|
215
|
-
* </li>
|
|
216
|
-
* <li>
|
|
217
|
-
* <p>
|
|
218
|
-
* <b>FunctionArgumentValidationError</b>
|
|
219
|
-
* </p>
|
|
220
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
221
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
222
|
-
* period character.</p>
|
|
223
|
-
* </li>
|
|
224
|
-
* </ul>
|
|
138
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
225
139
|
*
|
|
226
140
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
227
141
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|