aws_sdk_verifiedpermissions/lib.rs
1#![allow(deprecated)]
2#![allow(unknown_lints)]
3#![allow(clippy::module_inception)]
4#![allow(clippy::upper_case_acronyms)]
5#![allow(clippy::large_enum_variant)]
6#![allow(clippy::wrong_self_convention)]
7#![allow(clippy::should_implement_trait)]
8#![allow(clippy::disallowed_names)]
9#![allow(clippy::vec_init_then_push)]
10#![allow(clippy::type_complexity)]
11#![allow(clippy::needless_return)]
12#![allow(clippy::derive_partial_eq_without_eq)]
13#![allow(clippy::result_large_err)]
14#![allow(clippy::unnecessary_map_on_constructor)]
15#![allow(clippy::deprecated_semver)]
16#![allow(rustdoc::bare_urls)]
17#![allow(rustdoc::redundant_explicit_links)]
18#![allow(rustdoc::invalid_html_tags)]
19#![forbid(unsafe_code)]
20#![warn(missing_docs)]
21#![cfg_attr(docsrs, feature(doc_cfg))]
22//! Amazon Verified Permissions is a permissions management service from Amazon Web Services. You can use Verified Permissions to manage permissions for your application, and authorize user access based on those permissions. Using Verified Permissions, application developers can grant access based on information about the users, resources, and requested actions. You can also evaluate additional information like group membership, attributes of the resources, and session context, such as time of request and IP addresses. Verified Permissions manages these permissions by letting you create and store authorization policies for your applications, such as consumer-facing web sites and enterprise business systems.
23//!
24//! Verified Permissions uses Cedar as the policy language to express your permission requirements. Cedar supports both role-based access control (RBAC) and attribute-based access control (ABAC) authorization models.
25//!
26//! For more information about configuring, administering, and using Amazon Verified Permissions in your applications, see the [Amazon Verified Permissions User Guide](https://docs.aws.amazon.com/verifiedpermissions/latest/userguide/).
27//!
28//! For more information about the Cedar policy language, see the [Cedar Policy Language Guide](https://docs.cedarpolicy.com/).
29//!
30//! When you write Cedar policies that reference principals, resources and actions, you can define the unique identifiers used for each of those elements. We strongly recommend that you follow these best practices:
31//! - __Use values like universally unique identifiers (UUIDs) for all principal and resource identifiers.__ For example, if user jane leaves the company, and you later let someone else use the name jane, then that new user automatically gets access to everything granted by policies that still reference User::"jane". Cedar can’t distinguish between the new user and the old. This applies to both principal and resource identifiers. Always use identifiers that are guaranteed unique and never reused to ensure that you don’t unintentionally grant access because of the presence of an old identifier in a policy. Where you use a UUID for an entity, we recommend that you follow it with the // comment specifier and the ‘friendly’ name of your entity. This helps to make your policies easier to understand. For example: principal == User::"a1b2c3d4-e5f6-a1b2-c3d4-EXAMPLE11111", // alice
32//! - __Do not include personally identifying, confidential, or sensitive information as part of the unique identifier for your principals or resources.__ These identifiers are included in log entries shared in CloudTrail trails.
33//!
34//! Several operations return structures that appear similar, but have different purposes. As new functionality is added to the product, the structure used in a parameter of one operation might need to change in a way that wouldn't make sense for the same parameter in a different operation. To help you understand the purpose of each, the following naming convention is used for the structures:
35//! - Parameter type structures that end in Detail are used in Get operations.
36//! - Parameter type structures that end in Item are used in List operations.
37//! - Parameter type structures that use neither suffix are used in the mutating (create and update) operations.
38//!
39//! ## Getting Started
40//!
41//! > Examples are available for many services and operations, check out the
42//! > [usage examples](https://github.com/awsdocs/aws-doc-sdk-examples/tree/main/rustv1).
43//!
44//! The SDK provides one crate per AWS service. You must add [Tokio](https://crates.io/crates/tokio)
45//! as a dependency within your Rust project to execute asynchronous code. To add `aws-sdk-verifiedpermissions` to
46//! your project, add the following to your **Cargo.toml** file:
47//!
48//! ```toml
49//! [dependencies]
50//! aws-config = { version = "1.1.7", features = ["behavior-version-latest"] }
51//! aws-sdk-verifiedpermissions = "1.100.0"
52//! tokio = { version = "1", features = ["full"] }
53//! ```
54//!
55//! Then in code, a client can be created with the following:
56//!
57//! ```rust,no_run
58//! use aws_sdk_verifiedpermissions as verifiedpermissions;
59//!
60//! #[::tokio::main]
61//! async fn main() -> Result<(), verifiedpermissions::Error> {
62//! let config = aws_config::load_from_env().await;
63//! let client = aws_sdk_verifiedpermissions::Client::new(&config);
64//!
65//! // ... make some calls with the client
66//!
67//! Ok(())
68//! }
69//! ```
70//!
71//! See the [client documentation](https://docs.rs/aws-sdk-verifiedpermissions/latest/aws_sdk_verifiedpermissions/client/struct.Client.html)
72//! for information on what calls can be made, and the inputs and outputs for each of those calls.
73//!
74//! ## Using the SDK
75//!
76//! Until the SDK is released, we will be adding information about using the SDK to the
77//! [Developer Guide](https://docs.aws.amazon.com/sdk-for-rust/latest/dg/welcome.html). Feel free to suggest
78//! additional sections for the guide by opening an issue and describing what you are trying to do.
79//!
80//! ## Getting Help
81//!
82//! * [GitHub discussions](https://github.com/awslabs/aws-sdk-rust/discussions) - For ideas, RFCs & general questions
83//! * [GitHub issues](https://github.com/awslabs/aws-sdk-rust/issues/new/choose) - For bug reports & feature requests
84//! * [Generated Docs (latest version)](https://awslabs.github.io/aws-sdk-rust/)
85//! * [Usage examples](https://github.com/awsdocs/aws-doc-sdk-examples/tree/main/rustv1)
86//!
87//!
88//! # Crate Organization
89//!
90//! The entry point for most customers will be [`Client`], which exposes one method for each API
91//! offered by Amazon Verified Permissions. The return value of each of these methods is a "fluent builder",
92//! where the different inputs for that API are added by builder-style function call chaining,
93//! followed by calling `send()` to get a [`Future`](std::future::Future) that will result in
94//! either a successful output or a [`SdkError`](crate::error::SdkError).
95//!
96//! Some of these API inputs may be structs or enums to provide more complex structured information.
97//! These structs and enums live in [`types`](crate::types). There are some simpler types for
98//! representing data such as date times or binary blobs that live in [`primitives`](crate::primitives).
99//!
100//! All types required to configure a client via the [`Config`](crate::Config) struct live
101//! in [`config`](crate::config).
102//!
103//! The [`operation`](crate::operation) module has a submodule for every API, and in each submodule
104//! is the input, output, and error type for that API, as well as builders to construct each of those.
105//!
106//! There is a top-level [`Error`](crate::Error) type that encompasses all the errors that the
107//! client can return. Any other error type can be converted to this `Error` type via the
108//! [`From`](std::convert::From) trait.
109//!
110//! The other modules within this crate are not required for normal usage.
111
112// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
113pub use error_meta::Error;
114
115#[doc(inline)]
116pub use config::Config;
117
118/// Client for calling Amazon Verified Permissions.
119/// ## Constructing a `Client`
120///
121/// A [`Config`] is required to construct a client. For most use cases, the [`aws-config`]
122/// crate should be used to automatically resolve this config using
123/// [`aws_config::load_from_env()`], since this will resolve an [`SdkConfig`] which can be shared
124/// across multiple different AWS SDK clients. This config resolution process can be customized
125/// by calling [`aws_config::from_env()`] instead, which returns a [`ConfigLoader`] that uses
126/// the [builder pattern] to customize the default config.
127///
128/// In the simplest case, creating a client looks as follows:
129/// ```rust,no_run
130/// # async fn wrapper() {
131/// let config = aws_config::load_from_env().await;
132/// let client = aws_sdk_verifiedpermissions::Client::new(&config);
133/// # }
134/// ```
135///
136/// Occasionally, SDKs may have additional service-specific values that can be set on the [`Config`] that
137/// is absent from [`SdkConfig`], or slightly different settings for a specific client may be desired.
138/// The [`Builder`](crate::config::Builder) struct implements `From<&SdkConfig>`, so setting these specific settings can be
139/// done as follows:
140///
141/// ```rust,no_run
142/// # async fn wrapper() {
143/// let sdk_config = ::aws_config::load_from_env().await;
144/// let config = aws_sdk_verifiedpermissions::config::Builder::from(&sdk_config)
145/// # /*
146/// .some_service_specific_setting("value")
147/// # */
148/// .build();
149/// # }
150/// ```
151///
152/// See the [`aws-config` docs] and [`Config`] for more information on customizing configuration.
153///
154/// _Note:_ Client construction is expensive due to connection thread pool initialization, and should
155/// be done once at application start-up.
156///
157/// [`Config`]: crate::Config
158/// [`ConfigLoader`]: https://docs.rs/aws-config/*/aws_config/struct.ConfigLoader.html
159/// [`SdkConfig`]: https://docs.rs/aws-config/*/aws_config/struct.SdkConfig.html
160/// [`aws-config` docs]: https://docs.rs/aws-config/*
161/// [`aws-config`]: https://crates.io/crates/aws-config
162/// [`aws_config::from_env()`]: https://docs.rs/aws-config/*/aws_config/fn.from_env.html
163/// [`aws_config::load_from_env()`]: https://docs.rs/aws-config/*/aws_config/fn.load_from_env.html
164/// [builder pattern]: https://rust-lang.github.io/api-guidelines/type-safety.html#builders-enable-construction-of-complex-values-c-builder
165/// # Using the `Client`
166///
167/// A client has a function for every operation that can be performed by the service.
168/// For example, the [`BatchIsAuthorized`](crate::operation::batch_is_authorized) operation has
169/// a [`Client::batch_is_authorized`], function which returns a builder for that operation.
170/// The fluent builder ultimately has a `send()` function that returns an async future that
171/// returns a result, as illustrated below:
172///
173/// ```rust,ignore
174/// let result = client.batch_is_authorized()
175/// .policy_store_id("example")
176/// .send()
177/// .await;
178/// ```
179///
180/// The underlying HTTP requests that get made by this can be modified with the `customize_operation`
181/// function on the fluent builder. See the [`customize`](crate::client::customize) module for more
182/// information.
183pub mod client;
184
185/// Configuration for Amazon Verified Permissions.
186pub mod config;
187
188/// Common errors and error handling utilities.
189pub mod error;
190
191mod error_meta;
192
193/// Information about this crate.
194pub mod meta;
195
196/// All operations that this crate can perform.
197pub mod operation;
198
199/// Primitives such as `Blob` or `DateTime` used by other types.
200pub mod primitives;
201
202/// Data structures used by operation inputs/outputs.
203pub mod types;
204
205pub(crate) mod client_idempotency_token;
206
207mod idempotency_token;
208
209pub(crate) mod protocol_serde;
210
211mod sdk_feature_tracker;
212
213mod serialization_settings;
214
215mod endpoint_lib;
216
217mod lens;
218
219mod serde_util;
220
221mod json_errors;
222
223#[doc(inline)]
224pub use client::Client;