cdk-lambda-subminute 2.0.422 → 2.0.424

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -19,6 +19,14 @@ declare class VerifiedPermissions extends Service {
19
19
  * Makes a series of decisions about multiple authorization requests for one principal or resource. Each request contains the equivalent content of an IsAuthorized request: principal, action, resource, and context. Either the principal or the resource parameter must be identical across all requests. For example, Verified Permissions won't evaluate a pair of requests where bob views photo1 and alice views photo2. Authorization of bob to view photo1 and photo2, or bob and alice to view photo1, are valid batches. The request is evaluated against all policies in the specified policy store that match the entities that you declare. The result of the decisions is a series of Allow or Deny responses, along with the IDs of the policies that produced each decision. The entities of a BatchIsAuthorized API request can contain up to 100 principals and up to 100 resources. The requests of a BatchIsAuthorized API request can contain up to 30 requests. The BatchIsAuthorized operation doesn't have its own IAM permission. To authorize this operation for Amazon Web Services principals, include the permission verifiedpermissions:IsAuthorized in their IAM policies.
20
20
  */
21
21
  batchIsAuthorized(callback?: (err: AWSError, data: VerifiedPermissions.Types.BatchIsAuthorizedOutput) => void): Request<VerifiedPermissions.Types.BatchIsAuthorizedOutput, AWSError>;
22
+ /**
23
+ * Makes a series of decisions about multiple authorization requests for one token. The principal in this request comes from an external identity source in the form of an identity or access token, formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluations. The request is evaluated against all policies in the specified policy store that match the entities that you provide in the entities declaration and in the token. The result of the decisions is a series of Allow or Deny responses, along with the IDs of the policies that produced each decision. The entities of a BatchIsAuthorizedWithToken API request can contain up to 100 resources and up to 99 user groups. The requests of a BatchIsAuthorizedWithToken API request can contain up to 30 requests. The BatchIsAuthorizedWithToken operation doesn't have its own IAM permission. To authorize this operation for Amazon Web Services principals, include the permission verifiedpermissions:IsAuthorizedWithToken in their IAM policies.
24
+ */
25
+ batchIsAuthorizedWithToken(params: VerifiedPermissions.Types.BatchIsAuthorizedWithTokenInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.BatchIsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.BatchIsAuthorizedWithTokenOutput, AWSError>;
26
+ /**
27
+ * Makes a series of decisions about multiple authorization requests for one token. The principal in this request comes from an external identity source in the form of an identity or access token, formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluations. The request is evaluated against all policies in the specified policy store that match the entities that you provide in the entities declaration and in the token. The result of the decisions is a series of Allow or Deny responses, along with the IDs of the policies that produced each decision. The entities of a BatchIsAuthorizedWithToken API request can contain up to 100 resources and up to 99 user groups. The requests of a BatchIsAuthorizedWithToken API request can contain up to 30 requests. The BatchIsAuthorizedWithToken operation doesn't have its own IAM permission. To authorize this operation for Amazon Web Services principals, include the permission verifiedpermissions:IsAuthorizedWithToken in their IAM policies.
28
+ */
29
+ batchIsAuthorizedWithToken(callback?: (err: AWSError, data: VerifiedPermissions.Types.BatchIsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.BatchIsAuthorizedWithTokenOutput, AWSError>;
22
30
  /**
23
31
  * Creates a reference to an Amazon Cognito user pool as an external identity provider (IdP). After you create an identity source, you can use the identities provided by the IdP as proxies for the principal in authorization queries that use the IsAuthorizedWithToken operation. These identities take the form of tokens that contain claims about the user, such as IDs, attributes and group memberships. Amazon Cognito provides both identity tokens and access tokens, and Verified Permissions can use either or both. Any combination of identity and access tokens results in the same Cedar principal. Verified Permissions automatically translates the information about the identities into the standard Cedar attributes that can be evaluated by your policies. Because the Amazon Cognito identity and access tokens can contain different information, the tokens you choose to use determine which principal attributes are available to access when evaluating Cedar policies. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire. To reference a user from this identity source in your Cedar policies, use the following syntax. IdentityType::"&lt;CognitoUserPoolIdentifier&gt;|&lt;CognitoClientId&gt; Where IdentityType is the string that you provide to the PrincipalEntityType parameter for this operation. The CognitoUserPoolId and CognitoClientId are defined by the Amazon Cognito user pool. Verified Permissions is eventually consistent . It can take a few seconds for a new or changed element to propagate through the service and be visible in the results of other Verified Permissions operations.
24
32
  */
@@ -132,11 +140,11 @@ declare class VerifiedPermissions extends Service {
132
140
  */
133
141
  isAuthorized(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedOutput, AWSError>;
134
142
  /**
135
- * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you specify the identityToken parameter, then this operation derives the principal from that token. You must not also include that principal in the entities parameter or the operation fails and reports a conflict between the two entity sources. If you provide only an accessToken, then you can include the entity as part of the entities parameter to provide additional attributes. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
143
+ * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
136
144
  */
137
145
  isAuthorizedWithToken(params: VerifiedPermissions.Types.IsAuthorizedWithTokenInput, callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
138
146
  /**
139
- * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. If you specify the identityToken parameter, then this operation derives the principal from that token. You must not also include that principal in the entities parameter or the operation fails and reports a conflict between the two entity sources. If you provide only an accessToken, then you can include the entity as part of the entities parameter to provide additional attributes. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
147
+ * Makes an authorization decision about a service request described in the parameters. The principal in this request comes from an external identity source in the form of an identity token formatted as a JSON web token (JWT). The information in the parameters can also define additional context that Verified Permissions can include in the evaluation. The request is evaluated against all matching policies in the specified policy store. The result of the decision is either Allow or Deny, along with a list of the policies that resulted in the decision. At this time, Verified Permissions accepts tokens from only Amazon Cognito. Verified Permissions validates each token that is specified in a request by checking its expiration date and its signature. If you delete a Amazon Cognito user pool or user, tokens from that deleted pool or that deleted user continue to be usable until they expire.
140
148
  */
141
149
  isAuthorizedWithToken(callback?: (err: AWSError, data: VerifiedPermissions.Types.IsAuthorizedWithTokenOutput) => void): Request<VerifiedPermissions.Types.IsAuthorizedWithTokenOutput, AWSError>;
142
150
  /**
@@ -271,11 +279,11 @@ declare namespace VerifiedPermissions {
271
279
  */
272
280
  principal?: EntityIdentifier;
273
281
  /**
274
- * Specifies the requested action to be authorized. For example, is the principal authorized to perform this action on the resource?
282
+ * Specifies the requested action to be authorized. For example, PhotoFlash::ReadPhoto.
275
283
  */
276
284
  action?: ActionIdentifier;
277
285
  /**
278
- * Specifies the resource for which the authorization decision is to be made.
286
+ * Specifies the resource that you want an authorization decision for. For example, PhotoFlash::Photo.
279
287
  */
280
288
  resource?: EntityIdentifier;
281
289
  /**
@@ -304,15 +312,99 @@ declare namespace VerifiedPermissions {
304
312
  */
305
313
  determiningPolicies: DeterminingPolicyList;
306
314
  /**
307
- * Errors that occurred while making an authorization decision, for example, a policy references an Entity or entity Attribute that does not exist in the slice.
315
+ * Errors that occurred while making an authorization decision. For example, a policy might reference an entity or attribute that doesn't exist in the request.
308
316
  */
309
317
  errors: EvaluationErrorList;
310
318
  }
311
319
  export type BatchIsAuthorizedOutputList = BatchIsAuthorizedOutputItem[];
320
+ export interface BatchIsAuthorizedWithTokenInput {
321
+ /**
322
+ * Specifies the ID of the policy store. Policies in this policy store will be used to make an authorization decision for the input.
323
+ */
324
+ policyStoreId: PolicyStoreId;
325
+ /**
326
+ * Specifies an identity (ID) token for the principal that you want to authorize in each request. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an accessToken, an identityToken, or both. Must be an ID token. Verified Permissions returns an error if the token_use claim in the submitted token isn't id.
327
+ */
328
+ identityToken?: Token;
329
+ /**
330
+ * Specifies an access token for the principal that you want to authorize in each request. This token is provided to you by the identity provider (IdP) associated with the specified identity source. You must specify either an accessToken, an identityToken, or both. Must be an access token. Verified Permissions returns an error if the token_use claim in the submitted token isn't access.
331
+ */
332
+ accessToken?: Token;
333
+ /**
334
+ * Specifies the list of resources and their associated attributes that Verified Permissions can examine when evaluating the policies. You can't include principals in this parameter, only resource and action entities. This parameter can't include any entities of a type that matches the user or group entity types that you defined in your identity source. The BatchIsAuthorizedWithToken operation takes principal attributes from only the identityToken or accessToken passed to the operation. For action entities, you can include only their Identifier and EntityType.
335
+ */
336
+ entities?: EntitiesDefinition;
337
+ /**
338
+ * An array of up to 30 requests that you want Verified Permissions to evaluate.
339
+ */
340
+ requests: BatchIsAuthorizedWithTokenInputList;
341
+ }
342
+ export interface BatchIsAuthorizedWithTokenInputItem {
343
+ /**
344
+ * Specifies the requested action to be authorized. For example, PhotoFlash::ReadPhoto.
345
+ */
346
+ action?: ActionIdentifier;
347
+ /**
348
+ * Specifies the resource that you want an authorization decision for. For example, PhotoFlash::Photo.
349
+ */
350
+ resource?: EntityIdentifier;
351
+ /**
352
+ * Specifies additional context that can be used to make more granular authorization decisions.
353
+ */
354
+ context?: ContextDefinition;
355
+ }
356
+ export type BatchIsAuthorizedWithTokenInputList = BatchIsAuthorizedWithTokenInputItem[];
357
+ export interface BatchIsAuthorizedWithTokenOutput {
358
+ /**
359
+ * The identifier of the principal in the ID or access token.
360
+ */
361
+ principal?: EntityIdentifier;
362
+ /**
363
+ * A series of Allow or Deny decisions for each request, and the policies that produced them.
364
+ */
365
+ results: BatchIsAuthorizedWithTokenOutputList;
366
+ }
367
+ export interface BatchIsAuthorizedWithTokenOutputItem {
368
+ /**
369
+ * The authorization request that initiated the decision.
370
+ */
371
+ request: BatchIsAuthorizedWithTokenInputItem;
372
+ /**
373
+ * An authorization decision that indicates if the authorization request should be allowed or denied.
374
+ */
375
+ decision: Decision;
376
+ /**
377
+ * The list of determining policies used to make the authorization decision. For example, if there are two matching policies, where one is a forbid and the other is a permit, then the forbid policy will be the determining policy. In the case of multiple matching permit policies then there would be multiple determining policies. In the case that no policies match, and hence the response is DENY, there would be no determining policies.
378
+ */
379
+ determiningPolicies: DeterminingPolicyList;
380
+ /**
381
+ * Errors that occurred while making an authorization decision. For example, a policy might reference an entity or attribute that doesn't exist in the request.
382
+ */
383
+ errors: EvaluationErrorList;
384
+ }
385
+ export type BatchIsAuthorizedWithTokenOutputList = BatchIsAuthorizedWithTokenOutputItem[];
312
386
  export type Boolean = boolean;
313
387
  export type BooleanAttribute = boolean;
314
388
  export type ClientId = string;
315
389
  export type ClientIds = ClientId[];
390
+ export interface CognitoGroupConfiguration {
391
+ /**
392
+ * The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
393
+ */
394
+ groupEntityType: GroupEntityType;
395
+ }
396
+ export interface CognitoGroupConfigurationDetail {
397
+ /**
398
+ * The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
399
+ */
400
+ groupEntityType?: GroupEntityType;
401
+ }
402
+ export interface CognitoGroupConfigurationItem {
403
+ /**
404
+ * The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
405
+ */
406
+ groupEntityType?: GroupEntityType;
407
+ }
316
408
  export interface CognitoUserPoolConfiguration {
317
409
  /**
318
410
  * The Amazon Resource Name (ARN) of the Amazon Cognito user pool that contains the identities to be authorized. Example: "UserPoolArn": "arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5"
@@ -322,6 +414,10 @@ declare namespace VerifiedPermissions {
322
414
  * The unique application client IDs that are associated with the specified Amazon Cognito user pool. Example: "ClientIds": ["&amp;ExampleCogClientId;"]
323
415
  */
324
416
  clientIds?: ClientIds;
417
+ /**
418
+ * The configuration of the user groups from an Amazon Cognito user pool identity source.
419
+ */
420
+ groupConfiguration?: CognitoGroupConfiguration;
325
421
  }
326
422
  export interface CognitoUserPoolConfigurationDetail {
327
423
  /**
@@ -336,6 +432,10 @@ declare namespace VerifiedPermissions {
336
432
  * The OpenID Connect (OIDC) issuer ID of the Amazon Cognito user pool that contains the identities to be authorized. Example: "issuer": "https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5"
337
433
  */
338
434
  issuer: Issuer;
435
+ /**
436
+ * The configuration of the user groups from an Amazon Cognito user pool identity source.
437
+ */
438
+ groupConfiguration?: CognitoGroupConfigurationDetail;
339
439
  }
340
440
  export interface CognitoUserPoolConfigurationItem {
341
441
  /**
@@ -350,22 +450,26 @@ declare namespace VerifiedPermissions {
350
450
  * The OpenID Connect (OIDC) issuer ID of the Amazon Cognito user pool that contains the identities to be authorized. Example: "issuer": "https://cognito-idp.us-east-1.amazonaws.com/us-east-1_1a2b3c4d5"
351
451
  */
352
452
  issuer: Issuer;
453
+ /**
454
+ * The configuration of the user groups from an Amazon Cognito user pool identity source.
455
+ */
456
+ groupConfiguration?: CognitoGroupConfigurationItem;
353
457
  }
354
458
  export interface Configuration {
355
459
  /**
356
- * Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"]}}
460
+ * Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
357
461
  */
358
462
  cognitoUserPoolConfiguration?: CognitoUserPoolConfiguration;
359
463
  }
360
464
  export interface ConfigurationDetail {
361
465
  /**
362
- * Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"]}}
466
+ * Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
363
467
  */
364
468
  cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationDetail;
365
469
  }
366
470
  export interface ConfigurationItem {
367
471
  /**
368
- * Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"]}}
472
+ * Contains configuration details of a Amazon Cognito user pool that Verified Permissions can use as a source of authenticated identities as entities. It specifies the Amazon Resource Name (ARN) of a Amazon Cognito user pool and one or more application client IDs. Example: "configuration":{"cognitoUserPoolConfiguration":{"userPoolArn":"arn:aws:cognito-idp:us-east-1:123456789012:userpool/us-east-1_1a2b3c4d5","clientIds": ["a1b2c3d4e5f6g7h8i9j0kalbmc"],"groupConfiguration": {"groupEntityType": "MyCorp::Group"}}}
369
473
  */
370
474
  cognitoUserPoolConfiguration?: CognitoUserPoolConfigurationItem;
371
475
  }
@@ -808,6 +912,7 @@ declare namespace VerifiedPermissions {
808
912
  */
809
913
  namespaces?: NamespaceList;
810
914
  }
915
+ export type GroupEntityType = string;
811
916
  export type IdempotencyToken = string;
812
917
  export interface IdentitySourceDetails {
813
918
  /**
@@ -950,7 +1055,7 @@ declare namespace VerifiedPermissions {
950
1055
  */
951
1056
  context?: ContextDefinition;
952
1057
  /**
953
- * Specifies the list of resources and their associated attributes that Verified Permissions can examine when evaluating the policies. You can include only resource and action entities in this parameter; you can't include principals. The IsAuthorizedWithToken operation takes principal attributes from only the identityToken or accessToken passed to the operation. For action entities, you can include only their Identifier and EntityType.
1058
+ * Specifies the list of resources and their associated attributes that Verified Permissions can examine when evaluating the policies. You can't include principals in this parameter, only resource and action entities. This parameter can't include any entities of a type that matches the user or group entity types that you defined in your identity source. The IsAuthorizedWithToken operation takes principal attributes from only the identityToken or accessToken passed to the operation. For action entities, you can include only their Identifier and EntityType.
954
1059
  */
955
1060
  entities?: EntitiesDefinition;
956
1061
  }
@@ -967,6 +1072,10 @@ declare namespace VerifiedPermissions {
967
1072
  * Errors that occurred while making an authorization decision. For example, a policy references an entity or entity attribute that does not exist in the slice.
968
1073
  */
969
1074
  errors: EvaluationErrorList;
1075
+ /**
1076
+ * The identifier of the principal in the ID or access token.
1077
+ */
1078
+ principal?: EntityIdentifier;
970
1079
  }
971
1080
  export type Issuer = string;
972
1081
  export interface ListIdentitySourcesInput {
@@ -1325,6 +1434,12 @@ declare namespace VerifiedPermissions {
1325
1434
  }
1326
1435
  export type TimestampFormat = Date;
1327
1436
  export type Token = string;
1437
+ export interface UpdateCognitoGroupConfiguration {
1438
+ /**
1439
+ * The name of the schema entity type that's mapped to the user pool group. Defaults to AWS::CognitoGroup.
1440
+ */
1441
+ groupEntityType: GroupEntityType;
1442
+ }
1328
1443
  export interface UpdateCognitoUserPoolConfiguration {
1329
1444
  /**
1330
1445
  * The Amazon Resource Name (ARN) of the Amazon Cognito user pool associated with this identity source.
@@ -1334,6 +1449,10 @@ declare namespace VerifiedPermissions {
1334
1449
  * The client ID of an app client that is configured for the specified Amazon Cognito user pool.
1335
1450
  */
1336
1451
  clientIds?: ClientIds;
1452
+ /**
1453
+ * The configuration of the user groups from an Amazon Cognito user pool identity source.
1454
+ */
1455
+ groupConfiguration?: UpdateCognitoGroupConfiguration;
1337
1456
  }
1338
1457
  export interface UpdateConfiguration {
1339
1458
  /**
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1592.0',
86
+ VERSION: '2.1594.0',
87
87
 
88
88
  /**
89
89
  * @api private