CfnPolicyStorePropsMixin
- class aws_cdk.mixins_preview.aws_verifiedpermissions.mixins.CfnPolicyStorePropsMixin(props, *, strategy=None)
Bases:
MixinCreates a policy store.
A policy store is a container for policy resources. You can create a separate policy store for each of your applications.
- See:
- CloudformationResource:
AWS::VerifiedPermissions::PolicyStore
- Mixin:
true
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview import mixins from aws_cdk.mixins_preview.aws_verifiedpermissions import mixins as verifiedpermissions_mixins cfn_policy_store_props_mixin = verifiedpermissions_mixins.CfnPolicyStorePropsMixin(verifiedpermissions_mixins.CfnPolicyStoreMixinProps( deletion_protection=verifiedpermissions_mixins.CfnPolicyStorePropsMixin.DeletionProtectionProperty( mode="mode" ), description="description", schema=verifiedpermissions_mixins.CfnPolicyStorePropsMixin.SchemaDefinitionProperty( cedar_format="cedarFormat", cedar_json="cedarJson" ), tags=[CfnTag( key="key", value="value" )], validation_settings=verifiedpermissions_mixins.CfnPolicyStorePropsMixin.ValidationSettingsProperty( mode="mode" ) ), strategy=mixins.PropertyMergeStrategy.OVERRIDE )
Create a mixin to apply properties to
AWS::VerifiedPermissions::PolicyStore.- Parameters:
props (
Union[CfnPolicyStoreMixinProps,Dict[str,Any]]) – L1 properties to apply.strategy (
Optional[PropertyMergeStrategy]) – (experimental) Strategy for merging nested properties. Default: - PropertyMergeStrategy.MERGE
Methods
- apply_to(construct)
Apply the mixin properties to the construct.
- Parameters:
construct (
IConstruct)- Return type:
- supports(construct)
Check if this mixin supports the given construct.
- Parameters:
construct (
IConstruct)- Return type:
bool
Attributes
- CFN_PROPERTY_KEYS = ['deletionProtection', 'description', 'schema', 'tags', 'validationSettings']
Static Methods
- classmethod is_mixin(x)
(experimental) Checks if
xis a Mixin.- Parameters:
x (
Any) – Any object.- Return type:
bool- Returns:
true if
xis an object created from a class which extendsMixin.- Stability:
experimental
DeletionProtectionProperty
- class CfnPolicyStorePropsMixin.DeletionProtectionProperty(*, mode=None)
Bases:
objectSpecifies whether the policy store can be deleted.
- Parameters:
mode (
Optional[str]) – Specifies whether the policy store can be deleted. If enabled, the policy store can’t be deleted. The default state isDISABLED. Default: - “DISABLED”- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_verifiedpermissions import mixins as verifiedpermissions_mixins deletion_protection_property = verifiedpermissions_mixins.CfnPolicyStorePropsMixin.DeletionProtectionProperty( mode="mode" )
Attributes
- mode
Specifies whether the policy store can be deleted. If enabled, the policy store can’t be deleted.
The default state is
DISABLED.
SchemaDefinitionProperty
- class CfnPolicyStorePropsMixin.SchemaDefinitionProperty(*, cedar_format=None, cedar_json=None)
Bases:
objectContains a list of principal types, resource types, and actions that can be specified in policies stored in the same policy store.
If the validation mode for the policy store is set to
STRICT, then policies that can’t be validated by this schema are rejected by Verified Permissions and can’t be stored in the policy store.- Parameters:
cedar_format (
Optional[str])cedar_json (
Optional[str]) – A JSON string representation of the schema supported by applications that use this policy store. For more information, see Policy store schema in the AVP User Guide.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_verifiedpermissions import mixins as verifiedpermissions_mixins schema_definition_property = verifiedpermissions_mixins.CfnPolicyStorePropsMixin.SchemaDefinitionProperty( cedar_format="cedarFormat", cedar_json="cedarJson" )
Attributes
- cedar_format
-
- Type:
see
- cedar_json
A JSON string representation of the schema supported by applications that use this policy store.
For more information, see Policy store schema in the AVP User Guide.
ValidationSettingsProperty
- class CfnPolicyStorePropsMixin.ValidationSettingsProperty(*, mode=None)
Bases:
objectA structure that contains Cedar policy validation settings for the policy store.
The validation mode determines which validation failures that Cedar considers serious enough to block acceptance of a new or edited static policy or policy template.
- Parameters:
mode (
Optional[str]) – The validation mode currently configured for this policy store. The valid values are:. - OFF – Neither Verified Permissions nor Cedar perform any validation on policies. No validation errors are reported by either service. - STRICT – Requires a schema to be present in the policy store. Cedar performs validation on all submitted new or updated static policies and policy templates. Any that fail validation are rejected and Cedar doesn’t store them in the policy store. .. epigraph:: IfMode=STRICTand the policy store doesn’t contain a schema, Verified Permissions rejects all static policies and policy templates because there is no schema to validate against. To submit a static policy or policy template without a schema, you must turn off validation.- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_verifiedpermissions import mixins as verifiedpermissions_mixins validation_settings_property = verifiedpermissions_mixins.CfnPolicyStorePropsMixin.ValidationSettingsProperty( mode="mode" )
Attributes
- mode
.
OFF – Neither Verified Permissions nor Cedar perform any validation on policies. No validation errors are reported by either service.
STRICT – Requires a schema to be present in the policy store. Cedar performs validation on all submitted new or updated static policies and policy templates. Any that fail validation are rejected and Cedar doesn’t store them in the policy store.
If
Mode=STRICTand the policy store doesn’t contain a schema, Verified Permissions rejects all static policies and policy templates because there is no schema to validate against.To submit a static policy or policy template without a schema, you must turn off validation.
- See:
- Type:
The validation mode currently configured for this policy store. The valid values are