@aws-sdk/client-verifiedpermissions 3.799.0 → 3.801.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +25 -65
- package/dist-cjs/index.js +158 -0
- package/dist-es/VerifiedPermissions.js +6 -0
- package/dist-es/commands/ListTagsForResourceCommand.js +22 -0
- package/dist-es/commands/TagResourceCommand.js +22 -0
- package/dist-es/commands/UntagResourceCommand.js +22 -0
- package/dist-es/commands/index.js +3 -0
- package/dist-es/models/models_0.js +18 -0
- package/dist-es/protocols/Aws_json1_0.js +73 -1
- package/dist-types/VerifiedPermissions.d.ts +22 -65
- package/dist-types/VerifiedPermissionsClient.d.ts +6 -67
- package/dist-types/commands/BatchGetPolicyCommand.d.ts +2 -88
- package/dist-types/commands/BatchIsAuthorizedCommand.d.ts +2 -103
- package/dist-types/commands/BatchIsAuthorizedWithTokenCommand.d.ts +2 -101
- package/dist-types/commands/CreateIdentitySourceCommand.d.ts +3 -121
- package/dist-types/commands/CreatePolicyCommand.d.ts +3 -111
- package/dist-types/commands/CreatePolicyStoreCommand.d.ts +6 -95
- package/dist-types/commands/CreatePolicyTemplateCommand.d.ts +3 -97
- package/dist-types/commands/DeleteIdentitySourceCommand.d.ts +3 -88
- package/dist-types/commands/DeletePolicyCommand.d.ts +3 -87
- package/dist-types/commands/DeletePolicyStoreCommand.d.ts +2 -85
- package/dist-types/commands/DeletePolicyTemplateCommand.d.ts +3 -90
- package/dist-types/commands/GetIdentitySourceCommand.d.ts +1 -82
- package/dist-types/commands/GetPolicyCommand.d.ts +1 -82
- package/dist-types/commands/GetPolicyStoreCommand.d.ts +6 -82
- package/dist-types/commands/GetPolicyTemplateCommand.d.ts +1 -82
- package/dist-types/commands/GetSchemaCommand.d.ts +1 -82
- package/dist-types/commands/IsAuthorizedCommand.d.ts +2 -88
- package/dist-types/commands/IsAuthorizedWithTokenCommand.d.ts +2 -96
- package/dist-types/commands/ListIdentitySourcesCommand.d.ts +1 -82
- package/dist-types/commands/ListPoliciesCommand.d.ts +1 -82
- package/dist-types/commands/ListPolicyStoresCommand.d.ts +1 -82
- package/dist-types/commands/ListPolicyTemplatesCommand.d.ts +1 -82
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +107 -0
- package/dist-types/commands/PutSchemaCommand.d.ts +3 -95
- package/dist-types/commands/TagResourceCommand.d.ts +108 -0
- package/dist-types/commands/UntagResourceCommand.d.ts +105 -0
- package/dist-types/commands/UpdateIdentitySourceCommand.d.ts +3 -92
- package/dist-types/commands/UpdatePolicyCommand.d.ts +3 -135
- package/dist-types/commands/UpdatePolicyStoreCommand.d.ts +3 -91
- package/dist-types/commands/UpdatePolicyTemplateCommand.d.ts +3 -97
- package/dist-types/commands/index.d.ts +3 -0
- package/dist-types/index.d.ts +1 -65
- package/dist-types/models/models_0.d.ts +385 -1235
- package/dist-types/protocols/Aws_json1_0.d.ts +27 -0
- package/dist-types/ts3.4/VerifiedPermissions.d.ts +51 -0
- package/dist-types/ts3.4/VerifiedPermissionsClient.d.ts +18 -0
- package/dist-types/ts3.4/commands/ListTagsForResourceCommand.d.ts +51 -0
- package/dist-types/ts3.4/commands/TagResourceCommand.d.ts +47 -0
- package/dist-types/ts3.4/commands/UntagResourceCommand.d.ts +47 -0
- package/dist-types/ts3.4/commands/index.d.ts +3 -0
- package/dist-types/ts3.4/models/models_0.d.ts +33 -0
- package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +36 -0
- package/package.json +1 -1
|
@@ -27,17 +27,7 @@ declare const PutSchemaCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates or updates the policy schema in the specified policy store. The schema is used to
|
|
31
|
-
* validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema
|
|
32
|
-
* validate only policies and templates submitted after the schema change. Existing
|
|
33
|
-
* policies and templates are not re-evaluated against the changed schema. If you later
|
|
34
|
-
* update a policy, then it is evaluated against the new schema at that time.</p>
|
|
35
|
-
* <note>
|
|
36
|
-
* <p>Verified Permissions is <i>
|
|
37
|
-
* <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a>
|
|
38
|
-
* </i>. It can take a few seconds for a new or changed element to propagate through
|
|
39
|
-
* the service and be visible in the results of other Verified Permissions operations.</p>
|
|
40
|
-
* </note>
|
|
30
|
+
* <p>Creates or updates the policy schema in the specified policy store. The schema is used to validate any Cedar policies and policy templates submitted to the policy store. Any changes to the schema validate only policies and templates submitted after the schema change. Existing policies and templates are not re-evaluated against the changed schema. If you later update a policy, then it is evaluated against the new schema at that time.</p> <note> <p>Verified Permissions is <i> <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a> </i>. It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.</p> </note>
|
|
41
31
|
* @example
|
|
42
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
43
33
|
* ```javascript
|
|
@@ -70,8 +60,7 @@ declare const PutSchemaCommand_base: {
|
|
|
70
60
|
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
71
61
|
*
|
|
72
62
|
* @throws {@link ConflictException} (client fault)
|
|
73
|
-
* <p>The request failed because another request to modify a resource occurred at the
|
|
74
|
-
* same.</p>
|
|
63
|
+
* <p>The request failed because another request to modify a resource occurred at the same.</p>
|
|
75
64
|
*
|
|
76
65
|
* @throws {@link ResourceNotFoundException} (client fault)
|
|
77
66
|
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
@@ -89,88 +78,7 @@ declare const PutSchemaCommand_base: {
|
|
|
89
78
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
90
79
|
*
|
|
91
80
|
* @throws {@link ValidationException} (client fault)
|
|
92
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
93
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
94
|
-
* isn't valid.</p>
|
|
95
|
-
* <p>The possible reasons include the following:</p>
|
|
96
|
-
* <ul>
|
|
97
|
-
* <li>
|
|
98
|
-
* <p>
|
|
99
|
-
* <b>UnrecognizedEntityType</b>
|
|
100
|
-
* </p>
|
|
101
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
102
|
-
* </li>
|
|
103
|
-
* <li>
|
|
104
|
-
* <p>
|
|
105
|
-
* <b>UnrecognizedActionId</b>
|
|
106
|
-
* </p>
|
|
107
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
108
|
-
* </li>
|
|
109
|
-
* <li>
|
|
110
|
-
* <p>
|
|
111
|
-
* <b>InvalidActionApplication</b>
|
|
112
|
-
* </p>
|
|
113
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
114
|
-
* the specified principal and resource.</p>
|
|
115
|
-
* </li>
|
|
116
|
-
* <li>
|
|
117
|
-
* <p>
|
|
118
|
-
* <b>UnexpectedType</b>
|
|
119
|
-
* </p>
|
|
120
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
121
|
-
* operation.</p>
|
|
122
|
-
* </li>
|
|
123
|
-
* <li>
|
|
124
|
-
* <p>
|
|
125
|
-
* <b>IncompatibleTypes</b>
|
|
126
|
-
* </p>
|
|
127
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
128
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
129
|
-
* this context.</p>
|
|
130
|
-
* </li>
|
|
131
|
-
* <li>
|
|
132
|
-
* <p>
|
|
133
|
-
* <b>MissingAttribute</b>
|
|
134
|
-
* </p>
|
|
135
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
136
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
137
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
138
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
139
|
-
* </li>
|
|
140
|
-
* <li>
|
|
141
|
-
* <p>
|
|
142
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
143
|
-
* </p>
|
|
144
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
145
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
146
|
-
* first before attempting to access its value. For more information, see the
|
|
147
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
148
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
149
|
-
* </li>
|
|
150
|
-
* <li>
|
|
151
|
-
* <p>
|
|
152
|
-
* <b>ImpossiblePolicy</b>
|
|
153
|
-
* </p>
|
|
154
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
155
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
156
|
-
* affect an authorization decision.</p>
|
|
157
|
-
* </li>
|
|
158
|
-
* <li>
|
|
159
|
-
* <p>
|
|
160
|
-
* <b>WrongNumberArguments</b>
|
|
161
|
-
* </p>
|
|
162
|
-
* <p>The policy references an extension type with the wrong number of
|
|
163
|
-
* arguments.</p>
|
|
164
|
-
* </li>
|
|
165
|
-
* <li>
|
|
166
|
-
* <p>
|
|
167
|
-
* <b>FunctionArgumentValidationError</b>
|
|
168
|
-
* </p>
|
|
169
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
170
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
171
|
-
* period character.</p>
|
|
172
|
-
* </li>
|
|
173
|
-
* </ul>
|
|
81
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
174
82
|
*
|
|
175
83
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
176
84
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -0,0 +1,108 @@
|
|
|
1
|
+
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
|
+
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
+
import { TagResourceInput, TagResourceOutput } from "../models/models_0";
|
|
4
|
+
import { ServiceInputTypes, ServiceOutputTypes, VerifiedPermissionsClientResolvedConfig } from "../VerifiedPermissionsClient";
|
|
5
|
+
/**
|
|
6
|
+
* @public
|
|
7
|
+
*/
|
|
8
|
+
export type { __MetadataBearer };
|
|
9
|
+
export { $Command };
|
|
10
|
+
/**
|
|
11
|
+
* @public
|
|
12
|
+
*
|
|
13
|
+
* The input for {@link TagResourceCommand}.
|
|
14
|
+
*/
|
|
15
|
+
export interface TagResourceCommandInput extends TagResourceInput {
|
|
16
|
+
}
|
|
17
|
+
/**
|
|
18
|
+
* @public
|
|
19
|
+
*
|
|
20
|
+
* The output of {@link TagResourceCommand}.
|
|
21
|
+
*/
|
|
22
|
+
export interface TagResourceCommandOutput extends TagResourceOutput, __MetadataBearer {
|
|
23
|
+
}
|
|
24
|
+
declare const TagResourceCommand_base: {
|
|
25
|
+
new (input: TagResourceCommandInput): import("@smithy/smithy-client").CommandImpl<TagResourceCommandInput, TagResourceCommandOutput, VerifiedPermissionsClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
26
|
+
new (__0_0: TagResourceCommandInput): import("@smithy/smithy-client").CommandImpl<TagResourceCommandInput, TagResourceCommandOutput, VerifiedPermissionsClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
27
|
+
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
|
+
};
|
|
29
|
+
/**
|
|
30
|
+
* <p>Assigns one or more tags (key-value pairs) to the specified Amazon Verified Permissions resource. Tags can help you organize and categorize your resources. You can also use them to scope user permissions by granting a user permission to access or change only resources with certain tag values. In Verified Permissions, policy stores can be tagged.</p> <p>Tags don't have any semantic meaning to Amazon Web Services and are interpreted strictly as strings of characters.</p> <p>You can use the TagResource action with a resource that already has tags. If you specify a new tag key, this tag is appended to the list of tags associated with the resource. If you specify a tag key that is already associated with the resource, the new tag value that you specify replaces the previous value for that tag.</p> <p>You can associate as many as 50 tags with a resource.</p>
|
|
31
|
+
* @example
|
|
32
|
+
* Use a bare-bones client and the command you need to make an API call.
|
|
33
|
+
* ```javascript
|
|
34
|
+
* import { VerifiedPermissionsClient, TagResourceCommand } from "@aws-sdk/client-verifiedpermissions"; // ES Modules import
|
|
35
|
+
* // const { VerifiedPermissionsClient, TagResourceCommand } = require("@aws-sdk/client-verifiedpermissions"); // CommonJS import
|
|
36
|
+
* const client = new VerifiedPermissionsClient(config);
|
|
37
|
+
* const input = { // TagResourceInput
|
|
38
|
+
* resourceArn: "STRING_VALUE", // required
|
|
39
|
+
* tags: { // TagMap // required
|
|
40
|
+
* "<keys>": "STRING_VALUE",
|
|
41
|
+
* },
|
|
42
|
+
* };
|
|
43
|
+
* const command = new TagResourceCommand(input);
|
|
44
|
+
* const response = await client.send(command);
|
|
45
|
+
* // {};
|
|
46
|
+
*
|
|
47
|
+
* ```
|
|
48
|
+
*
|
|
49
|
+
* @param TagResourceCommandInput - {@link TagResourceCommandInput}
|
|
50
|
+
* @returns {@link TagResourceCommandOutput}
|
|
51
|
+
* @see {@link TagResourceCommandInput} for command's `input` shape.
|
|
52
|
+
* @see {@link TagResourceCommandOutput} for command's `response` shape.
|
|
53
|
+
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
54
|
+
*
|
|
55
|
+
* @throws {@link AccessDeniedException} (client fault)
|
|
56
|
+
* <p>You don't have sufficient access to perform this action.</p>
|
|
57
|
+
*
|
|
58
|
+
* @throws {@link InternalServerException} (server fault)
|
|
59
|
+
* <p>The request failed because of an internal error. Try your request again later</p>
|
|
60
|
+
*
|
|
61
|
+
* @throws {@link ResourceNotFoundException} (client fault)
|
|
62
|
+
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
63
|
+
*
|
|
64
|
+
* @throws {@link ThrottlingException} (client fault)
|
|
65
|
+
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
66
|
+
*
|
|
67
|
+
* @throws {@link TooManyTagsException} (client fault)
|
|
68
|
+
* <p>No more tags be added because the limit (50) has been reached. To add new tags, use <code>UntagResource</code> to remove existing tags.</p>
|
|
69
|
+
*
|
|
70
|
+
* @throws {@link ValidationException} (client fault)
|
|
71
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
72
|
+
*
|
|
73
|
+
* @throws {@link VerifiedPermissionsServiceException}
|
|
74
|
+
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
75
|
+
*
|
|
76
|
+
*
|
|
77
|
+
* @example TagResource
|
|
78
|
+
* ```javascript
|
|
79
|
+
* // The following example tags the resource.
|
|
80
|
+
* const input = {
|
|
81
|
+
* resourceArn: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
82
|
+
* tags: {
|
|
83
|
+
* key1: "value1",
|
|
84
|
+
* key2: "value2"
|
|
85
|
+
* }
|
|
86
|
+
* };
|
|
87
|
+
* const command = new TagResourceCommand(input);
|
|
88
|
+
* const response = await client.send(command);
|
|
89
|
+
* /* response is
|
|
90
|
+
* { /* empty *\/ }
|
|
91
|
+
* *\/
|
|
92
|
+
* ```
|
|
93
|
+
*
|
|
94
|
+
* @public
|
|
95
|
+
*/
|
|
96
|
+
export declare class TagResourceCommand extends TagResourceCommand_base {
|
|
97
|
+
/** @internal type navigation helper, not in runtime. */
|
|
98
|
+
protected static __types: {
|
|
99
|
+
api: {
|
|
100
|
+
input: TagResourceInput;
|
|
101
|
+
output: {};
|
|
102
|
+
};
|
|
103
|
+
sdk: {
|
|
104
|
+
input: TagResourceCommandInput;
|
|
105
|
+
output: TagResourceCommandOutput;
|
|
106
|
+
};
|
|
107
|
+
};
|
|
108
|
+
}
|
|
@@ -0,0 +1,105 @@
|
|
|
1
|
+
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
|
+
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
+
import { UntagResourceInput, UntagResourceOutput } from "../models/models_0";
|
|
4
|
+
import { ServiceInputTypes, ServiceOutputTypes, VerifiedPermissionsClientResolvedConfig } from "../VerifiedPermissionsClient";
|
|
5
|
+
/**
|
|
6
|
+
* @public
|
|
7
|
+
*/
|
|
8
|
+
export type { __MetadataBearer };
|
|
9
|
+
export { $Command };
|
|
10
|
+
/**
|
|
11
|
+
* @public
|
|
12
|
+
*
|
|
13
|
+
* The input for {@link UntagResourceCommand}.
|
|
14
|
+
*/
|
|
15
|
+
export interface UntagResourceCommandInput extends UntagResourceInput {
|
|
16
|
+
}
|
|
17
|
+
/**
|
|
18
|
+
* @public
|
|
19
|
+
*
|
|
20
|
+
* The output of {@link UntagResourceCommand}.
|
|
21
|
+
*/
|
|
22
|
+
export interface UntagResourceCommandOutput extends UntagResourceOutput, __MetadataBearer {
|
|
23
|
+
}
|
|
24
|
+
declare const UntagResourceCommand_base: {
|
|
25
|
+
new (input: UntagResourceCommandInput): import("@smithy/smithy-client").CommandImpl<UntagResourceCommandInput, UntagResourceCommandOutput, VerifiedPermissionsClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
26
|
+
new (__0_0: UntagResourceCommandInput): import("@smithy/smithy-client").CommandImpl<UntagResourceCommandInput, UntagResourceCommandOutput, VerifiedPermissionsClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
27
|
+
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
|
+
};
|
|
29
|
+
/**
|
|
30
|
+
* <p>Removes one or more tags from the specified Amazon Verified Permissions resource. In Verified Permissions, policy stores can be tagged.</p>
|
|
31
|
+
* @example
|
|
32
|
+
* Use a bare-bones client and the command you need to make an API call.
|
|
33
|
+
* ```javascript
|
|
34
|
+
* import { VerifiedPermissionsClient, UntagResourceCommand } from "@aws-sdk/client-verifiedpermissions"; // ES Modules import
|
|
35
|
+
* // const { VerifiedPermissionsClient, UntagResourceCommand } = require("@aws-sdk/client-verifiedpermissions"); // CommonJS import
|
|
36
|
+
* const client = new VerifiedPermissionsClient(config);
|
|
37
|
+
* const input = { // UntagResourceInput
|
|
38
|
+
* resourceArn: "STRING_VALUE", // required
|
|
39
|
+
* tagKeys: [ // TagKeyList // required
|
|
40
|
+
* "STRING_VALUE",
|
|
41
|
+
* ],
|
|
42
|
+
* };
|
|
43
|
+
* const command = new UntagResourceCommand(input);
|
|
44
|
+
* const response = await client.send(command);
|
|
45
|
+
* // {};
|
|
46
|
+
*
|
|
47
|
+
* ```
|
|
48
|
+
*
|
|
49
|
+
* @param UntagResourceCommandInput - {@link UntagResourceCommandInput}
|
|
50
|
+
* @returns {@link UntagResourceCommandOutput}
|
|
51
|
+
* @see {@link UntagResourceCommandInput} for command's `input` shape.
|
|
52
|
+
* @see {@link UntagResourceCommandOutput} for command's `response` shape.
|
|
53
|
+
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
54
|
+
*
|
|
55
|
+
* @throws {@link AccessDeniedException} (client fault)
|
|
56
|
+
* <p>You don't have sufficient access to perform this action.</p>
|
|
57
|
+
*
|
|
58
|
+
* @throws {@link InternalServerException} (server fault)
|
|
59
|
+
* <p>The request failed because of an internal error. Try your request again later</p>
|
|
60
|
+
*
|
|
61
|
+
* @throws {@link ResourceNotFoundException} (client fault)
|
|
62
|
+
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
63
|
+
*
|
|
64
|
+
* @throws {@link ThrottlingException} (client fault)
|
|
65
|
+
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
66
|
+
*
|
|
67
|
+
* @throws {@link ValidationException} (client fault)
|
|
68
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
69
|
+
*
|
|
70
|
+
* @throws {@link VerifiedPermissionsServiceException}
|
|
71
|
+
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
72
|
+
*
|
|
73
|
+
*
|
|
74
|
+
* @example UntagResource
|
|
75
|
+
* ```javascript
|
|
76
|
+
* // The following example removes the listed tags from the resource.
|
|
77
|
+
* const input = {
|
|
78
|
+
* resourceArn: "C7v5xMplfFH3i3e4Jrzb1a",
|
|
79
|
+
* tagKeys: [
|
|
80
|
+
* "key1",
|
|
81
|
+
* "key2"
|
|
82
|
+
* ]
|
|
83
|
+
* };
|
|
84
|
+
* const command = new UntagResourceCommand(input);
|
|
85
|
+
* const response = await client.send(command);
|
|
86
|
+
* /* response is
|
|
87
|
+
* { /* empty *\/ }
|
|
88
|
+
* *\/
|
|
89
|
+
* ```
|
|
90
|
+
*
|
|
91
|
+
* @public
|
|
92
|
+
*/
|
|
93
|
+
export declare class UntagResourceCommand extends UntagResourceCommand_base {
|
|
94
|
+
/** @internal type navigation helper, not in runtime. */
|
|
95
|
+
protected static __types: {
|
|
96
|
+
api: {
|
|
97
|
+
input: UntagResourceInput;
|
|
98
|
+
output: {};
|
|
99
|
+
};
|
|
100
|
+
sdk: {
|
|
101
|
+
input: UntagResourceCommandInput;
|
|
102
|
+
output: UntagResourceCommandOutput;
|
|
103
|
+
};
|
|
104
|
+
};
|
|
105
|
+
}
|
|
@@ -27,14 +27,7 @@ declare const UpdateIdentitySourceCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Updates the specified identity source to use a new identity provider (IdP), or to change
|
|
31
|
-
* the mapping of identities from the IdP to a different principal entity type.</p>
|
|
32
|
-
* <note>
|
|
33
|
-
* <p>Verified Permissions is <i>
|
|
34
|
-
* <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a>
|
|
35
|
-
* </i>. It can take a few seconds for a new or changed element to propagate through
|
|
36
|
-
* the service and be visible in the results of other Verified Permissions operations.</p>
|
|
37
|
-
* </note>
|
|
30
|
+
* <p>Updates the specified identity source to use a new identity provider (IdP), or to change the mapping of identities from the IdP to a different principal entity type.</p> <note> <p>Verified Permissions is <i> <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a> </i>. It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.</p> </note>
|
|
38
31
|
* @example
|
|
39
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
40
33
|
* ```javascript
|
|
@@ -97,8 +90,7 @@ declare const UpdateIdentitySourceCommand_base: {
|
|
|
97
90
|
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
98
91
|
*
|
|
99
92
|
* @throws {@link ConflictException} (client fault)
|
|
100
|
-
* <p>The request failed because another request to modify a resource occurred at the
|
|
101
|
-
* same.</p>
|
|
93
|
+
* <p>The request failed because another request to modify a resource occurred at the same.</p>
|
|
102
94
|
*
|
|
103
95
|
* @throws {@link ResourceNotFoundException} (client fault)
|
|
104
96
|
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
@@ -113,88 +105,7 @@ declare const UpdateIdentitySourceCommand_base: {
|
|
|
113
105
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
114
106
|
*
|
|
115
107
|
* @throws {@link ValidationException} (client fault)
|
|
116
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
117
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
118
|
-
* isn't valid.</p>
|
|
119
|
-
* <p>The possible reasons include the following:</p>
|
|
120
|
-
* <ul>
|
|
121
|
-
* <li>
|
|
122
|
-
* <p>
|
|
123
|
-
* <b>UnrecognizedEntityType</b>
|
|
124
|
-
* </p>
|
|
125
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
126
|
-
* </li>
|
|
127
|
-
* <li>
|
|
128
|
-
* <p>
|
|
129
|
-
* <b>UnrecognizedActionId</b>
|
|
130
|
-
* </p>
|
|
131
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
132
|
-
* </li>
|
|
133
|
-
* <li>
|
|
134
|
-
* <p>
|
|
135
|
-
* <b>InvalidActionApplication</b>
|
|
136
|
-
* </p>
|
|
137
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
138
|
-
* the specified principal and resource.</p>
|
|
139
|
-
* </li>
|
|
140
|
-
* <li>
|
|
141
|
-
* <p>
|
|
142
|
-
* <b>UnexpectedType</b>
|
|
143
|
-
* </p>
|
|
144
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
145
|
-
* operation.</p>
|
|
146
|
-
* </li>
|
|
147
|
-
* <li>
|
|
148
|
-
* <p>
|
|
149
|
-
* <b>IncompatibleTypes</b>
|
|
150
|
-
* </p>
|
|
151
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
152
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
153
|
-
* this context.</p>
|
|
154
|
-
* </li>
|
|
155
|
-
* <li>
|
|
156
|
-
* <p>
|
|
157
|
-
* <b>MissingAttribute</b>
|
|
158
|
-
* </p>
|
|
159
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
160
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
161
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
162
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
163
|
-
* </li>
|
|
164
|
-
* <li>
|
|
165
|
-
* <p>
|
|
166
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
167
|
-
* </p>
|
|
168
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
169
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
170
|
-
* first before attempting to access its value. For more information, see the
|
|
171
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
172
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
173
|
-
* </li>
|
|
174
|
-
* <li>
|
|
175
|
-
* <p>
|
|
176
|
-
* <b>ImpossiblePolicy</b>
|
|
177
|
-
* </p>
|
|
178
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
179
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
180
|
-
* affect an authorization decision.</p>
|
|
181
|
-
* </li>
|
|
182
|
-
* <li>
|
|
183
|
-
* <p>
|
|
184
|
-
* <b>WrongNumberArguments</b>
|
|
185
|
-
* </p>
|
|
186
|
-
* <p>The policy references an extension type with the wrong number of
|
|
187
|
-
* arguments.</p>
|
|
188
|
-
* </li>
|
|
189
|
-
* <li>
|
|
190
|
-
* <p>
|
|
191
|
-
* <b>FunctionArgumentValidationError</b>
|
|
192
|
-
* </p>
|
|
193
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
194
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
195
|
-
* period character.</p>
|
|
196
|
-
* </li>
|
|
197
|
-
* </ul>
|
|
108
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
198
109
|
*
|
|
199
110
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
200
111
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -27,57 +27,7 @@ declare const UpdatePolicyCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Modifies a Cedar static policy in the specified policy store. You can change only certain elements of
|
|
31
|
-
* the <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_UpdatePolicyInput.html#amazonverifiedpermissions-UpdatePolicy-request-UpdatePolicyDefinition">UpdatePolicyDefinition</a> parameter. You can directly update only static policies. To
|
|
32
|
-
* change a template-linked policy, you must update the template instead, using <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_UpdatePolicyTemplate.html">UpdatePolicyTemplate</a>.</p>
|
|
33
|
-
* <note>
|
|
34
|
-
* <ul>
|
|
35
|
-
* <li>
|
|
36
|
-
* <p>If policy validation is enabled in the policy store, then updating a static policy causes
|
|
37
|
-
* Verified Permissions to validate the policy against the schema in the policy store. If the updated
|
|
38
|
-
* static policy doesn't pass validation, the operation fails and the update isn't
|
|
39
|
-
* stored.</p>
|
|
40
|
-
* </li>
|
|
41
|
-
* <li>
|
|
42
|
-
* <p>When you edit a static policy, you can change only certain elements of a static
|
|
43
|
-
* policy:</p>
|
|
44
|
-
* <ul>
|
|
45
|
-
* <li>
|
|
46
|
-
* <p>The action referenced by the policy. </p>
|
|
47
|
-
* </li>
|
|
48
|
-
* <li>
|
|
49
|
-
* <p>A condition clause, such as when and unless. </p>
|
|
50
|
-
* </li>
|
|
51
|
-
* </ul>
|
|
52
|
-
* <p>You can't change these elements of a static policy: </p>
|
|
53
|
-
* <ul>
|
|
54
|
-
* <li>
|
|
55
|
-
* <p>Changing a policy from a static policy to a template-linked
|
|
56
|
-
* policy. </p>
|
|
57
|
-
* </li>
|
|
58
|
-
* <li>
|
|
59
|
-
* <p>Changing the effect of a static policy from permit or forbid.
|
|
60
|
-
* </p>
|
|
61
|
-
* </li>
|
|
62
|
-
* <li>
|
|
63
|
-
* <p>The principal referenced by a static policy. </p>
|
|
64
|
-
* </li>
|
|
65
|
-
* <li>
|
|
66
|
-
* <p>The resource referenced by a static policy. </p>
|
|
67
|
-
* </li>
|
|
68
|
-
* </ul>
|
|
69
|
-
* </li>
|
|
70
|
-
* <li>
|
|
71
|
-
* <p>To update a template-linked policy, you must update the template instead. </p>
|
|
72
|
-
* </li>
|
|
73
|
-
* </ul>
|
|
74
|
-
* </note>
|
|
75
|
-
* <note>
|
|
76
|
-
* <p>Verified Permissions is <i>
|
|
77
|
-
* <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a>
|
|
78
|
-
* </i>. It can take a few seconds for a new or changed element to propagate through
|
|
79
|
-
* the service and be visible in the results of other Verified Permissions operations.</p>
|
|
80
|
-
* </note>
|
|
30
|
+
* <p>Modifies a Cedar static policy in the specified policy store. You can change only certain elements of the <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_UpdatePolicyInput.html#amazonverifiedpermissions-UpdatePolicy-request-UpdatePolicyDefinition">UpdatePolicyDefinition</a> parameter. You can directly update only static policies. To change a template-linked policy, you must update the template instead, using <a href="https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_UpdatePolicyTemplate.html">UpdatePolicyTemplate</a>.</p> <note> <ul> <li> <p>If policy validation is enabled in the policy store, then updating a static policy causes Verified Permissions to validate the policy against the schema in the policy store. If the updated static policy doesn't pass validation, the operation fails and the update isn't stored.</p> </li> <li> <p>When you edit a static policy, you can change only certain elements of a static policy:</p> <ul> <li> <p>The action referenced by the policy. </p> </li> <li> <p>A condition clause, such as when and unless. </p> </li> </ul> <p>You can't change these elements of a static policy: </p> <ul> <li> <p>Changing a policy from a static policy to a template-linked policy. </p> </li> <li> <p>Changing the effect of a static policy from permit or forbid. </p> </li> <li> <p>The principal referenced by a static policy. </p> </li> <li> <p>The resource referenced by a static policy. </p> </li> </ul> </li> <li> <p>To update a template-linked policy, you must update the template instead. </p> </li> </ul> </note> <note> <p>Verified Permissions is <i> <a href="https://wikipedia.org/wiki/Eventual_consistency">eventually consistent</a> </i>. It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.</p> </note>
|
|
81
31
|
* @example
|
|
82
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
83
33
|
* ```javascript
|
|
@@ -128,8 +78,7 @@ declare const UpdatePolicyCommand_base: {
|
|
|
128
78
|
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
129
79
|
*
|
|
130
80
|
* @throws {@link ConflictException} (client fault)
|
|
131
|
-
* <p>The request failed because another request to modify a resource occurred at the
|
|
132
|
-
* same.</p>
|
|
81
|
+
* <p>The request failed because another request to modify a resource occurred at the same.</p>
|
|
133
82
|
*
|
|
134
83
|
* @throws {@link ResourceNotFoundException} (client fault)
|
|
135
84
|
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
@@ -147,88 +96,7 @@ declare const UpdatePolicyCommand_base: {
|
|
|
147
96
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
148
97
|
*
|
|
149
98
|
* @throws {@link ValidationException} (client fault)
|
|
150
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
151
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
152
|
-
* isn't valid.</p>
|
|
153
|
-
* <p>The possible reasons include the following:</p>
|
|
154
|
-
* <ul>
|
|
155
|
-
* <li>
|
|
156
|
-
* <p>
|
|
157
|
-
* <b>UnrecognizedEntityType</b>
|
|
158
|
-
* </p>
|
|
159
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
160
|
-
* </li>
|
|
161
|
-
* <li>
|
|
162
|
-
* <p>
|
|
163
|
-
* <b>UnrecognizedActionId</b>
|
|
164
|
-
* </p>
|
|
165
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
166
|
-
* </li>
|
|
167
|
-
* <li>
|
|
168
|
-
* <p>
|
|
169
|
-
* <b>InvalidActionApplication</b>
|
|
170
|
-
* </p>
|
|
171
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
172
|
-
* the specified principal and resource.</p>
|
|
173
|
-
* </li>
|
|
174
|
-
* <li>
|
|
175
|
-
* <p>
|
|
176
|
-
* <b>UnexpectedType</b>
|
|
177
|
-
* </p>
|
|
178
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
179
|
-
* operation.</p>
|
|
180
|
-
* </li>
|
|
181
|
-
* <li>
|
|
182
|
-
* <p>
|
|
183
|
-
* <b>IncompatibleTypes</b>
|
|
184
|
-
* </p>
|
|
185
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
186
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
187
|
-
* this context.</p>
|
|
188
|
-
* </li>
|
|
189
|
-
* <li>
|
|
190
|
-
* <p>
|
|
191
|
-
* <b>MissingAttribute</b>
|
|
192
|
-
* </p>
|
|
193
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
194
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
195
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
196
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
197
|
-
* </li>
|
|
198
|
-
* <li>
|
|
199
|
-
* <p>
|
|
200
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
201
|
-
* </p>
|
|
202
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
203
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
204
|
-
* first before attempting to access its value. For more information, see the
|
|
205
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
206
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
207
|
-
* </li>
|
|
208
|
-
* <li>
|
|
209
|
-
* <p>
|
|
210
|
-
* <b>ImpossiblePolicy</b>
|
|
211
|
-
* </p>
|
|
212
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
213
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
214
|
-
* affect an authorization decision.</p>
|
|
215
|
-
* </li>
|
|
216
|
-
* <li>
|
|
217
|
-
* <p>
|
|
218
|
-
* <b>WrongNumberArguments</b>
|
|
219
|
-
* </p>
|
|
220
|
-
* <p>The policy references an extension type with the wrong number of
|
|
221
|
-
* arguments.</p>
|
|
222
|
-
* </li>
|
|
223
|
-
* <li>
|
|
224
|
-
* <p>
|
|
225
|
-
* <b>FunctionArgumentValidationError</b>
|
|
226
|
-
* </p>
|
|
227
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
228
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
229
|
-
* period character.</p>
|
|
230
|
-
* </li>
|
|
231
|
-
* </ul>
|
|
99
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
232
100
|
*
|
|
233
101
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
234
102
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|