@aws-sdk/client-verifiedpermissions 3.799.0 → 3.803.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +25 -65
- package/dist-cjs/index.js +158 -0
- package/dist-es/VerifiedPermissions.js +6 -0
- package/dist-es/commands/ListTagsForResourceCommand.js +22 -0
- package/dist-es/commands/TagResourceCommand.js +22 -0
- package/dist-es/commands/UntagResourceCommand.js +22 -0
- package/dist-es/commands/index.js +3 -0
- package/dist-es/models/models_0.js +18 -0
- package/dist-es/protocols/Aws_json1_0.js +73 -1
- package/dist-types/VerifiedPermissions.d.ts +22 -65
- package/dist-types/VerifiedPermissionsClient.d.ts +6 -67
- package/dist-types/commands/BatchGetPolicyCommand.d.ts +2 -88
- package/dist-types/commands/BatchIsAuthorizedCommand.d.ts +2 -103
- package/dist-types/commands/BatchIsAuthorizedWithTokenCommand.d.ts +2 -101
- package/dist-types/commands/CreateIdentitySourceCommand.d.ts +3 -121
- package/dist-types/commands/CreatePolicyCommand.d.ts +3 -111
- package/dist-types/commands/CreatePolicyStoreCommand.d.ts +6 -95
- package/dist-types/commands/CreatePolicyTemplateCommand.d.ts +3 -97
- package/dist-types/commands/DeleteIdentitySourceCommand.d.ts +3 -88
- package/dist-types/commands/DeletePolicyCommand.d.ts +3 -87
- package/dist-types/commands/DeletePolicyStoreCommand.d.ts +2 -85
- package/dist-types/commands/DeletePolicyTemplateCommand.d.ts +3 -90
- package/dist-types/commands/GetIdentitySourceCommand.d.ts +1 -82
- package/dist-types/commands/GetPolicyCommand.d.ts +1 -82
- package/dist-types/commands/GetPolicyStoreCommand.d.ts +6 -82
- package/dist-types/commands/GetPolicyTemplateCommand.d.ts +1 -82
- package/dist-types/commands/GetSchemaCommand.d.ts +1 -82
- package/dist-types/commands/IsAuthorizedCommand.d.ts +2 -88
- package/dist-types/commands/IsAuthorizedWithTokenCommand.d.ts +2 -96
- package/dist-types/commands/ListIdentitySourcesCommand.d.ts +1 -82
- package/dist-types/commands/ListPoliciesCommand.d.ts +1 -82
- package/dist-types/commands/ListPolicyStoresCommand.d.ts +1 -82
- package/dist-types/commands/ListPolicyTemplatesCommand.d.ts +1 -82
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +107 -0
- package/dist-types/commands/PutSchemaCommand.d.ts +3 -95
- package/dist-types/commands/TagResourceCommand.d.ts +108 -0
- package/dist-types/commands/UntagResourceCommand.d.ts +105 -0
- package/dist-types/commands/UpdateIdentitySourceCommand.d.ts +3 -92
- package/dist-types/commands/UpdatePolicyCommand.d.ts +3 -135
- package/dist-types/commands/UpdatePolicyStoreCommand.d.ts +3 -91
- package/dist-types/commands/UpdatePolicyTemplateCommand.d.ts +3 -97
- package/dist-types/commands/index.d.ts +3 -0
- package/dist-types/index.d.ts +1 -65
- package/dist-types/models/models_0.d.ts +385 -1235
- package/dist-types/protocols/Aws_json1_0.d.ts +27 -0
- package/dist-types/ts3.4/VerifiedPermissions.d.ts +51 -0
- package/dist-types/ts3.4/VerifiedPermissionsClient.d.ts +18 -0
- package/dist-types/ts3.4/commands/ListTagsForResourceCommand.d.ts +51 -0
- package/dist-types/ts3.4/commands/TagResourceCommand.d.ts +47 -0
- package/dist-types/ts3.4/commands/UntagResourceCommand.d.ts +47 -0
- package/dist-types/ts3.4/commands/index.d.ts +3 -0
- package/dist-types/ts3.4/models/models_0.d.ts +33 -0
- package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +36 -0
- package/package.json +4 -4
|
@@ -27,20 +27,7 @@ declare const IsAuthorizedWithTokenCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Makes an authorization decision about a service request described in the parameters.
|
|
31
|
-
* The principal in this request comes from an external identity source in the form of an identity
|
|
32
|
-
* token formatted as a <a href="https://wikipedia.org/wiki/JSON_Web_Token">JSON web
|
|
33
|
-
* token (JWT)</a>. The information in the parameters can also define additional
|
|
34
|
-
* context that Verified Permissions can include in the evaluation. The request is evaluated against all
|
|
35
|
-
* matching policies in the specified policy store. The result of the decision is either
|
|
36
|
-
* <code>Allow</code> or <code>Deny</code>, along with a list of the policies that
|
|
37
|
-
* resulted in the decision.</p>
|
|
38
|
-
* <p>Verified Permissions validates each token that is specified in a request by checking its expiration
|
|
39
|
-
* date and its signature.</p>
|
|
40
|
-
* <important>
|
|
41
|
-
* <p>Tokens from an identity source user continue to be usable until they expire.
|
|
42
|
-
* Token revocation and resource deletion have no effect on the validity of a token in your policy store</p>
|
|
43
|
-
* </important>
|
|
30
|
+
* <p>Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a <a href="https://wikipedia.org/wiki/JSON_Web_Token">JSON web token (JWT)</a>. The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either <code>Allow</code> or <code>Deny</code>, along with a list of the policies that resulted in the decision.</p> <p>Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature.</p> <important> <p>Tokens from an identity source user continue to be usable until they expire. Token revocation and resource deletion have no effect on the validity of a token in your policy store</p> </important>
|
|
44
31
|
* @example
|
|
45
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
46
33
|
* ```javascript
|
|
@@ -150,88 +137,7 @@ declare const IsAuthorizedWithTokenCommand_base: {
|
|
|
150
137
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
151
138
|
*
|
|
152
139
|
* @throws {@link ValidationException} (client fault)
|
|
153
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
154
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
155
|
-
* isn't valid.</p>
|
|
156
|
-
* <p>The possible reasons include the following:</p>
|
|
157
|
-
* <ul>
|
|
158
|
-
* <li>
|
|
159
|
-
* <p>
|
|
160
|
-
* <b>UnrecognizedEntityType</b>
|
|
161
|
-
* </p>
|
|
162
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
163
|
-
* </li>
|
|
164
|
-
* <li>
|
|
165
|
-
* <p>
|
|
166
|
-
* <b>UnrecognizedActionId</b>
|
|
167
|
-
* </p>
|
|
168
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
169
|
-
* </li>
|
|
170
|
-
* <li>
|
|
171
|
-
* <p>
|
|
172
|
-
* <b>InvalidActionApplication</b>
|
|
173
|
-
* </p>
|
|
174
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
175
|
-
* the specified principal and resource.</p>
|
|
176
|
-
* </li>
|
|
177
|
-
* <li>
|
|
178
|
-
* <p>
|
|
179
|
-
* <b>UnexpectedType</b>
|
|
180
|
-
* </p>
|
|
181
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
182
|
-
* operation.</p>
|
|
183
|
-
* </li>
|
|
184
|
-
* <li>
|
|
185
|
-
* <p>
|
|
186
|
-
* <b>IncompatibleTypes</b>
|
|
187
|
-
* </p>
|
|
188
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
189
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
190
|
-
* this context.</p>
|
|
191
|
-
* </li>
|
|
192
|
-
* <li>
|
|
193
|
-
* <p>
|
|
194
|
-
* <b>MissingAttribute</b>
|
|
195
|
-
* </p>
|
|
196
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
197
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
198
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
199
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
200
|
-
* </li>
|
|
201
|
-
* <li>
|
|
202
|
-
* <p>
|
|
203
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
204
|
-
* </p>
|
|
205
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
206
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
207
|
-
* first before attempting to access its value. For more information, see the
|
|
208
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
209
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
210
|
-
* </li>
|
|
211
|
-
* <li>
|
|
212
|
-
* <p>
|
|
213
|
-
* <b>ImpossiblePolicy</b>
|
|
214
|
-
* </p>
|
|
215
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
216
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
217
|
-
* affect an authorization decision.</p>
|
|
218
|
-
* </li>
|
|
219
|
-
* <li>
|
|
220
|
-
* <p>
|
|
221
|
-
* <b>WrongNumberArguments</b>
|
|
222
|
-
* </p>
|
|
223
|
-
* <p>The policy references an extension type with the wrong number of
|
|
224
|
-
* arguments.</p>
|
|
225
|
-
* </li>
|
|
226
|
-
* <li>
|
|
227
|
-
* <p>
|
|
228
|
-
* <b>FunctionArgumentValidationError</b>
|
|
229
|
-
* </p>
|
|
230
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
231
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
232
|
-
* period character.</p>
|
|
233
|
-
* </li>
|
|
234
|
-
* </ul>
|
|
140
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
235
141
|
*
|
|
236
142
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
237
143
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -120,88 +120,7 @@ declare const ListIdentitySourcesCommand_base: {
|
|
|
120
120
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
121
121
|
*
|
|
122
122
|
* @throws {@link ValidationException} (client fault)
|
|
123
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
124
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
125
|
-
* isn't valid.</p>
|
|
126
|
-
* <p>The possible reasons include the following:</p>
|
|
127
|
-
* <ul>
|
|
128
|
-
* <li>
|
|
129
|
-
* <p>
|
|
130
|
-
* <b>UnrecognizedEntityType</b>
|
|
131
|
-
* </p>
|
|
132
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
133
|
-
* </li>
|
|
134
|
-
* <li>
|
|
135
|
-
* <p>
|
|
136
|
-
* <b>UnrecognizedActionId</b>
|
|
137
|
-
* </p>
|
|
138
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
139
|
-
* </li>
|
|
140
|
-
* <li>
|
|
141
|
-
* <p>
|
|
142
|
-
* <b>InvalidActionApplication</b>
|
|
143
|
-
* </p>
|
|
144
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
145
|
-
* the specified principal and resource.</p>
|
|
146
|
-
* </li>
|
|
147
|
-
* <li>
|
|
148
|
-
* <p>
|
|
149
|
-
* <b>UnexpectedType</b>
|
|
150
|
-
* </p>
|
|
151
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
152
|
-
* operation.</p>
|
|
153
|
-
* </li>
|
|
154
|
-
* <li>
|
|
155
|
-
* <p>
|
|
156
|
-
* <b>IncompatibleTypes</b>
|
|
157
|
-
* </p>
|
|
158
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
159
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
160
|
-
* this context.</p>
|
|
161
|
-
* </li>
|
|
162
|
-
* <li>
|
|
163
|
-
* <p>
|
|
164
|
-
* <b>MissingAttribute</b>
|
|
165
|
-
* </p>
|
|
166
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
167
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
168
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
169
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
170
|
-
* </li>
|
|
171
|
-
* <li>
|
|
172
|
-
* <p>
|
|
173
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
174
|
-
* </p>
|
|
175
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
176
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
177
|
-
* first before attempting to access its value. For more information, see the
|
|
178
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
179
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
180
|
-
* </li>
|
|
181
|
-
* <li>
|
|
182
|
-
* <p>
|
|
183
|
-
* <b>ImpossiblePolicy</b>
|
|
184
|
-
* </p>
|
|
185
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
186
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
187
|
-
* affect an authorization decision.</p>
|
|
188
|
-
* </li>
|
|
189
|
-
* <li>
|
|
190
|
-
* <p>
|
|
191
|
-
* <b>WrongNumberArguments</b>
|
|
192
|
-
* </p>
|
|
193
|
-
* <p>The policy references an extension type with the wrong number of
|
|
194
|
-
* arguments.</p>
|
|
195
|
-
* </li>
|
|
196
|
-
* <li>
|
|
197
|
-
* <p>
|
|
198
|
-
* <b>FunctionArgumentValidationError</b>
|
|
199
|
-
* </p>
|
|
200
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
201
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
202
|
-
* period character.</p>
|
|
203
|
-
* </li>
|
|
204
|
-
* </ul>
|
|
123
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
205
124
|
*
|
|
206
125
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
207
126
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -124,88 +124,7 @@ declare const ListPoliciesCommand_base: {
|
|
|
124
124
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
125
125
|
*
|
|
126
126
|
* @throws {@link ValidationException} (client fault)
|
|
127
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
128
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
129
|
-
* isn't valid.</p>
|
|
130
|
-
* <p>The possible reasons include the following:</p>
|
|
131
|
-
* <ul>
|
|
132
|
-
* <li>
|
|
133
|
-
* <p>
|
|
134
|
-
* <b>UnrecognizedEntityType</b>
|
|
135
|
-
* </p>
|
|
136
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
137
|
-
* </li>
|
|
138
|
-
* <li>
|
|
139
|
-
* <p>
|
|
140
|
-
* <b>UnrecognizedActionId</b>
|
|
141
|
-
* </p>
|
|
142
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
143
|
-
* </li>
|
|
144
|
-
* <li>
|
|
145
|
-
* <p>
|
|
146
|
-
* <b>InvalidActionApplication</b>
|
|
147
|
-
* </p>
|
|
148
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
149
|
-
* the specified principal and resource.</p>
|
|
150
|
-
* </li>
|
|
151
|
-
* <li>
|
|
152
|
-
* <p>
|
|
153
|
-
* <b>UnexpectedType</b>
|
|
154
|
-
* </p>
|
|
155
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
156
|
-
* operation.</p>
|
|
157
|
-
* </li>
|
|
158
|
-
* <li>
|
|
159
|
-
* <p>
|
|
160
|
-
* <b>IncompatibleTypes</b>
|
|
161
|
-
* </p>
|
|
162
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
163
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
164
|
-
* this context.</p>
|
|
165
|
-
* </li>
|
|
166
|
-
* <li>
|
|
167
|
-
* <p>
|
|
168
|
-
* <b>MissingAttribute</b>
|
|
169
|
-
* </p>
|
|
170
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
171
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
172
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
173
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
174
|
-
* </li>
|
|
175
|
-
* <li>
|
|
176
|
-
* <p>
|
|
177
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
178
|
-
* </p>
|
|
179
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
180
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
181
|
-
* first before attempting to access its value. For more information, see the
|
|
182
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
183
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
184
|
-
* </li>
|
|
185
|
-
* <li>
|
|
186
|
-
* <p>
|
|
187
|
-
* <b>ImpossiblePolicy</b>
|
|
188
|
-
* </p>
|
|
189
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
190
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
191
|
-
* affect an authorization decision.</p>
|
|
192
|
-
* </li>
|
|
193
|
-
* <li>
|
|
194
|
-
* <p>
|
|
195
|
-
* <b>WrongNumberArguments</b>
|
|
196
|
-
* </p>
|
|
197
|
-
* <p>The policy references an extension type with the wrong number of
|
|
198
|
-
* arguments.</p>
|
|
199
|
-
* </li>
|
|
200
|
-
* <li>
|
|
201
|
-
* <p>
|
|
202
|
-
* <b>FunctionArgumentValidationError</b>
|
|
203
|
-
* </p>
|
|
204
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
205
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
206
|
-
* period character.</p>
|
|
207
|
-
* </li>
|
|
208
|
-
* </ul>
|
|
127
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
209
128
|
*
|
|
210
129
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
211
130
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -71,88 +71,7 @@ declare const ListPolicyStoresCommand_base: {
|
|
|
71
71
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
72
72
|
*
|
|
73
73
|
* @throws {@link ValidationException} (client fault)
|
|
74
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
75
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
76
|
-
* isn't valid.</p>
|
|
77
|
-
* <p>The possible reasons include the following:</p>
|
|
78
|
-
* <ul>
|
|
79
|
-
* <li>
|
|
80
|
-
* <p>
|
|
81
|
-
* <b>UnrecognizedEntityType</b>
|
|
82
|
-
* </p>
|
|
83
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
84
|
-
* </li>
|
|
85
|
-
* <li>
|
|
86
|
-
* <p>
|
|
87
|
-
* <b>UnrecognizedActionId</b>
|
|
88
|
-
* </p>
|
|
89
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
90
|
-
* </li>
|
|
91
|
-
* <li>
|
|
92
|
-
* <p>
|
|
93
|
-
* <b>InvalidActionApplication</b>
|
|
94
|
-
* </p>
|
|
95
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
96
|
-
* the specified principal and resource.</p>
|
|
97
|
-
* </li>
|
|
98
|
-
* <li>
|
|
99
|
-
* <p>
|
|
100
|
-
* <b>UnexpectedType</b>
|
|
101
|
-
* </p>
|
|
102
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
103
|
-
* operation.</p>
|
|
104
|
-
* </li>
|
|
105
|
-
* <li>
|
|
106
|
-
* <p>
|
|
107
|
-
* <b>IncompatibleTypes</b>
|
|
108
|
-
* </p>
|
|
109
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
110
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
111
|
-
* this context.</p>
|
|
112
|
-
* </li>
|
|
113
|
-
* <li>
|
|
114
|
-
* <p>
|
|
115
|
-
* <b>MissingAttribute</b>
|
|
116
|
-
* </p>
|
|
117
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
118
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
119
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
120
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
121
|
-
* </li>
|
|
122
|
-
* <li>
|
|
123
|
-
* <p>
|
|
124
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
125
|
-
* </p>
|
|
126
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
127
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
128
|
-
* first before attempting to access its value. For more information, see the
|
|
129
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
130
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
131
|
-
* </li>
|
|
132
|
-
* <li>
|
|
133
|
-
* <p>
|
|
134
|
-
* <b>ImpossiblePolicy</b>
|
|
135
|
-
* </p>
|
|
136
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
137
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
138
|
-
* affect an authorization decision.</p>
|
|
139
|
-
* </li>
|
|
140
|
-
* <li>
|
|
141
|
-
* <p>
|
|
142
|
-
* <b>WrongNumberArguments</b>
|
|
143
|
-
* </p>
|
|
144
|
-
* <p>The policy references an extension type with the wrong number of
|
|
145
|
-
* arguments.</p>
|
|
146
|
-
* </li>
|
|
147
|
-
* <li>
|
|
148
|
-
* <p>
|
|
149
|
-
* <b>FunctionArgumentValidationError</b>
|
|
150
|
-
* </p>
|
|
151
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
152
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
153
|
-
* period character.</p>
|
|
154
|
-
* </li>
|
|
155
|
-
* </ul>
|
|
74
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
156
75
|
*
|
|
157
76
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
158
77
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -75,88 +75,7 @@ declare const ListPolicyTemplatesCommand_base: {
|
|
|
75
75
|
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
76
76
|
*
|
|
77
77
|
* @throws {@link ValidationException} (client fault)
|
|
78
|
-
* <p>The request failed because one or more input parameters don't satisfy their constraint
|
|
79
|
-
* requirements. The output is provided as a list of fields and a reason for each field that
|
|
80
|
-
* isn't valid.</p>
|
|
81
|
-
* <p>The possible reasons include the following:</p>
|
|
82
|
-
* <ul>
|
|
83
|
-
* <li>
|
|
84
|
-
* <p>
|
|
85
|
-
* <b>UnrecognizedEntityType</b>
|
|
86
|
-
* </p>
|
|
87
|
-
* <p>The policy includes an entity type that isn't found in the schema.</p>
|
|
88
|
-
* </li>
|
|
89
|
-
* <li>
|
|
90
|
-
* <p>
|
|
91
|
-
* <b>UnrecognizedActionId</b>
|
|
92
|
-
* </p>
|
|
93
|
-
* <p>The policy includes an action id that isn't found in the schema.</p>
|
|
94
|
-
* </li>
|
|
95
|
-
* <li>
|
|
96
|
-
* <p>
|
|
97
|
-
* <b>InvalidActionApplication</b>
|
|
98
|
-
* </p>
|
|
99
|
-
* <p>The policy includes an action that, according to the schema, doesn't support
|
|
100
|
-
* the specified principal and resource.</p>
|
|
101
|
-
* </li>
|
|
102
|
-
* <li>
|
|
103
|
-
* <p>
|
|
104
|
-
* <b>UnexpectedType</b>
|
|
105
|
-
* </p>
|
|
106
|
-
* <p>The policy included an operand that isn't a valid type for the specified
|
|
107
|
-
* operation.</p>
|
|
108
|
-
* </li>
|
|
109
|
-
* <li>
|
|
110
|
-
* <p>
|
|
111
|
-
* <b>IncompatibleTypes</b>
|
|
112
|
-
* </p>
|
|
113
|
-
* <p>The types of elements included in a <code>set</code>, or the types of
|
|
114
|
-
* expressions used in an <code>if...then...else</code> clause aren't compatible in
|
|
115
|
-
* this context.</p>
|
|
116
|
-
* </li>
|
|
117
|
-
* <li>
|
|
118
|
-
* <p>
|
|
119
|
-
* <b>MissingAttribute</b>
|
|
120
|
-
* </p>
|
|
121
|
-
* <p>The policy attempts to access a record or entity attribute that isn't
|
|
122
|
-
* specified in the schema. Test for the existence of the attribute first before
|
|
123
|
-
* attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
124
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
125
|
-
* </li>
|
|
126
|
-
* <li>
|
|
127
|
-
* <p>
|
|
128
|
-
* <b>UnsafeOptionalAttributeAccess</b>
|
|
129
|
-
* </p>
|
|
130
|
-
* <p>The policy attempts to access a record or entity attribute that is optional
|
|
131
|
-
* and isn't guaranteed to be present. Test for the existence of the attribute
|
|
132
|
-
* first before attempting to access its value. For more information, see the
|
|
133
|
-
* <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the
|
|
134
|
-
* <i>Cedar Policy Language Guide</i>.</p>
|
|
135
|
-
* </li>
|
|
136
|
-
* <li>
|
|
137
|
-
* <p>
|
|
138
|
-
* <b>ImpossiblePolicy</b>
|
|
139
|
-
* </p>
|
|
140
|
-
* <p>Cedar has determined that a policy condition always evaluates to false. If
|
|
141
|
-
* the policy is always false, it can never apply to any query, and so it can never
|
|
142
|
-
* affect an authorization decision.</p>
|
|
143
|
-
* </li>
|
|
144
|
-
* <li>
|
|
145
|
-
* <p>
|
|
146
|
-
* <b>WrongNumberArguments</b>
|
|
147
|
-
* </p>
|
|
148
|
-
* <p>The policy references an extension type with the wrong number of
|
|
149
|
-
* arguments.</p>
|
|
150
|
-
* </li>
|
|
151
|
-
* <li>
|
|
152
|
-
* <p>
|
|
153
|
-
* <b>FunctionArgumentValidationError</b>
|
|
154
|
-
* </p>
|
|
155
|
-
* <p>Cedar couldn't parse the argument passed to an extension type. For example,
|
|
156
|
-
* a string that is to be parsed as an IPv4 address can contain only digits and the
|
|
157
|
-
* period character.</p>
|
|
158
|
-
* </li>
|
|
159
|
-
* </ul>
|
|
78
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
160
79
|
*
|
|
161
80
|
* @throws {@link VerifiedPermissionsServiceException}
|
|
162
81
|
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
|
+
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
+
import { ListTagsForResourceInput, ListTagsForResourceOutput } from "../models/models_0";
|
|
4
|
+
import { ServiceInputTypes, ServiceOutputTypes, VerifiedPermissionsClientResolvedConfig } from "../VerifiedPermissionsClient";
|
|
5
|
+
/**
|
|
6
|
+
* @public
|
|
7
|
+
*/
|
|
8
|
+
export type { __MetadataBearer };
|
|
9
|
+
export { $Command };
|
|
10
|
+
/**
|
|
11
|
+
* @public
|
|
12
|
+
*
|
|
13
|
+
* The input for {@link ListTagsForResourceCommand}.
|
|
14
|
+
*/
|
|
15
|
+
export interface ListTagsForResourceCommandInput extends ListTagsForResourceInput {
|
|
16
|
+
}
|
|
17
|
+
/**
|
|
18
|
+
* @public
|
|
19
|
+
*
|
|
20
|
+
* The output of {@link ListTagsForResourceCommand}.
|
|
21
|
+
*/
|
|
22
|
+
export interface ListTagsForResourceCommandOutput extends ListTagsForResourceOutput, __MetadataBearer {
|
|
23
|
+
}
|
|
24
|
+
declare const ListTagsForResourceCommand_base: {
|
|
25
|
+
new (input: ListTagsForResourceCommandInput): import("@smithy/smithy-client").CommandImpl<ListTagsForResourceCommandInput, ListTagsForResourceCommandOutput, VerifiedPermissionsClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
26
|
+
new (__0_0: ListTagsForResourceCommandInput): import("@smithy/smithy-client").CommandImpl<ListTagsForResourceCommandInput, ListTagsForResourceCommandOutput, VerifiedPermissionsClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
27
|
+
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
|
+
};
|
|
29
|
+
/**
|
|
30
|
+
* <p>Returns the tags associated with the specified Amazon Verified Permissions resource. In Verified Permissions, policy stores can be tagged.</p>
|
|
31
|
+
* @example
|
|
32
|
+
* Use a bare-bones client and the command you need to make an API call.
|
|
33
|
+
* ```javascript
|
|
34
|
+
* import { VerifiedPermissionsClient, ListTagsForResourceCommand } from "@aws-sdk/client-verifiedpermissions"; // ES Modules import
|
|
35
|
+
* // const { VerifiedPermissionsClient, ListTagsForResourceCommand } = require("@aws-sdk/client-verifiedpermissions"); // CommonJS import
|
|
36
|
+
* const client = new VerifiedPermissionsClient(config);
|
|
37
|
+
* const input = { // ListTagsForResourceInput
|
|
38
|
+
* resourceArn: "STRING_VALUE", // required
|
|
39
|
+
* };
|
|
40
|
+
* const command = new ListTagsForResourceCommand(input);
|
|
41
|
+
* const response = await client.send(command);
|
|
42
|
+
* // { // ListTagsForResourceOutput
|
|
43
|
+
* // tags: { // TagMap
|
|
44
|
+
* // "<keys>": "STRING_VALUE",
|
|
45
|
+
* // },
|
|
46
|
+
* // };
|
|
47
|
+
*
|
|
48
|
+
* ```
|
|
49
|
+
*
|
|
50
|
+
* @param ListTagsForResourceCommandInput - {@link ListTagsForResourceCommandInput}
|
|
51
|
+
* @returns {@link ListTagsForResourceCommandOutput}
|
|
52
|
+
* @see {@link ListTagsForResourceCommandInput} for command's `input` shape.
|
|
53
|
+
* @see {@link ListTagsForResourceCommandOutput} for command's `response` shape.
|
|
54
|
+
* @see {@link VerifiedPermissionsClientResolvedConfig | config} for VerifiedPermissionsClient's `config` shape.
|
|
55
|
+
*
|
|
56
|
+
* @throws {@link AccessDeniedException} (client fault)
|
|
57
|
+
* <p>You don't have sufficient access to perform this action.</p>
|
|
58
|
+
*
|
|
59
|
+
* @throws {@link InternalServerException} (server fault)
|
|
60
|
+
* <p>The request failed because of an internal error. Try your request again later</p>
|
|
61
|
+
*
|
|
62
|
+
* @throws {@link ResourceNotFoundException} (client fault)
|
|
63
|
+
* <p>The request failed because it references a resource that doesn't exist.</p>
|
|
64
|
+
*
|
|
65
|
+
* @throws {@link ThrottlingException} (client fault)
|
|
66
|
+
* <p>The request failed because it exceeded a throttling quota.</p>
|
|
67
|
+
*
|
|
68
|
+
* @throws {@link ValidationException} (client fault)
|
|
69
|
+
* <p>The request failed because one or more input parameters don't satisfy their constraint requirements. The output is provided as a list of fields and a reason for each field that isn't valid.</p> <p>The possible reasons include the following:</p> <ul> <li> <p> <b>UnrecognizedEntityType</b> </p> <p>The policy includes an entity type that isn't found in the schema.</p> </li> <li> <p> <b>UnrecognizedActionId</b> </p> <p>The policy includes an action id that isn't found in the schema.</p> </li> <li> <p> <b>InvalidActionApplication</b> </p> <p>The policy includes an action that, according to the schema, doesn't support the specified principal and resource.</p> </li> <li> <p> <b>UnexpectedType</b> </p> <p>The policy included an operand that isn't a valid type for the specified operation.</p> </li> <li> <p> <b>IncompatibleTypes</b> </p> <p>The types of elements included in a <code>set</code>, or the types of expressions used in an <code>if...then...else</code> clause aren't compatible in this context.</p> </li> <li> <p> <b>MissingAttribute</b> </p> <p>The policy attempts to access a record or entity attribute that isn't specified in the schema. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>UnsafeOptionalAttributeAccess</b> </p> <p>The policy attempts to access a record or entity attribute that is optional and isn't guaranteed to be present. Test for the existence of the attribute first before attempting to access its value. For more information, see the <a href="https://docs.cedarpolicy.com/policies/syntax-operators.html#has-presence-of-attribute-test">has (presence of attribute test) operator</a> in the <i>Cedar Policy Language Guide</i>.</p> </li> <li> <p> <b>ImpossiblePolicy</b> </p> <p>Cedar has determined that a policy condition always evaluates to false. If the policy is always false, it can never apply to any query, and so it can never affect an authorization decision.</p> </li> <li> <p> <b>WrongNumberArguments</b> </p> <p>The policy references an extension type with the wrong number of arguments.</p> </li> <li> <p> <b>FunctionArgumentValidationError</b> </p> <p>Cedar couldn't parse the argument passed to an extension type. For example, a string that is to be parsed as an IPv4 address can contain only digits and the period character.</p> </li> </ul>
|
|
70
|
+
*
|
|
71
|
+
* @throws {@link VerifiedPermissionsServiceException}
|
|
72
|
+
* <p>Base exception class for all service exceptions from VerifiedPermissions service.</p>
|
|
73
|
+
*
|
|
74
|
+
*
|
|
75
|
+
* @example ListTagsForResource
|
|
76
|
+
* ```javascript
|
|
77
|
+
* // The following example lists all the tags for the resource named in the API call.
|
|
78
|
+
* const input = {
|
|
79
|
+
* resourceArn: "C7v5xMplfFH3i3e4Jrzb1a"
|
|
80
|
+
* };
|
|
81
|
+
* const command = new ListTagsForResourceCommand(input);
|
|
82
|
+
* const response = await client.send(command);
|
|
83
|
+
* /* response is
|
|
84
|
+
* {
|
|
85
|
+
* tags: {
|
|
86
|
+
* key1: "value1",
|
|
87
|
+
* key2: "value2"
|
|
88
|
+
* }
|
|
89
|
+
* }
|
|
90
|
+
* *\/
|
|
91
|
+
* ```
|
|
92
|
+
*
|
|
93
|
+
* @public
|
|
94
|
+
*/
|
|
95
|
+
export declare class ListTagsForResourceCommand extends ListTagsForResourceCommand_base {
|
|
96
|
+
/** @internal type navigation helper, not in runtime. */
|
|
97
|
+
protected static __types: {
|
|
98
|
+
api: {
|
|
99
|
+
input: ListTagsForResourceInput;
|
|
100
|
+
output: ListTagsForResourceOutput;
|
|
101
|
+
};
|
|
102
|
+
sdk: {
|
|
103
|
+
input: ListTagsForResourceCommandInput;
|
|
104
|
+
output: ListTagsForResourceCommandOutput;
|
|
105
|
+
};
|
|
106
|
+
};
|
|
107
|
+
}
|