aws-sdk-kendra 1.54.0 → 1.55.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d4240d17fe61982b5177976416a82fd836972e8b33398a09c04f197b4acb0113
4
- data.tar.gz: a900055b5d88bd8ae701b2c4bff8e458dafd969754ce61f4ee2a2b3f4291a8fb
3
+ metadata.gz: b8bbc73b0d8f18063a335e61711c239cc08dbf24318e13530aebcbf2298a4f49
4
+ data.tar.gz: d78255a788cbf472af1a10c47bc44447631492f5d2416e6e498f641045666df0
5
5
  SHA512:
6
- metadata.gz: c3deaa532d8db31cb5175aa3986b1c79c5a2b0ab13493a7097cecd8c1a4ba8f1b662488cef685cb4d3705383e72dc453a9f3827cd9e0eb6a52130da59d1d1e14
7
- data.tar.gz: a5317199aa6ae4091c731903b760c66d778cb8e8e916d344e21de70bff61976b1b10cde4e2498634e2784a748163dbd7180e225a500b0d68223caa4e724c0b04
6
+ metadata.gz: 2e69c8cc1269516cbd097a2613c04a4c947ac13fa029a5b9fd641d8b023c7b2512ef7771c3a780b282a5ab9e2fe86394826ce09d1476b69fe8f6bdd58a54b29a
7
+ data.tar.gz: 436dbb5d0fbaeb7ee4a1c82755a2149c401223e392afb9da81ad254b0835ad779d4a9187d01b41a8e570ef939dd3d5c7c7d9df13750544427890bb55fa46cd6b
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.55.0 (2022-07-21)
5
+ ------------------
6
+
7
+ * Feature - Amazon Kendra now provides Oauth2 support for SharePoint Online. For more information, see https://docs.aws.amazon.com/kendra/latest/dg/data-source-sharepoint.html
8
+
4
9
  1.54.0 (2022-07-14)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.54.0
1
+ 1.55.0
@@ -830,15 +830,14 @@ module Aws::Kendra
830
830
  # control without indexing all of your documents again. For example,
831
831
  # your index contains top-secret company documents that only certain
832
832
  # employees or users should access. One of these users leaves the
833
- # company or switches to a team that should be blocked from access to
834
- # top-secret documents. Your documents in your index still give this
835
- # user access to top-secret documents due to the user having access at
836
- # the time your documents were indexed. You can create a specific access
837
- # control configuration for this user with deny access. You can later
838
- # update the access control configuration to allow access in the case
839
- # the user returns to the company and re-joins the 'top-secret' team.
840
- # You can re-configure access control for your documents circumstances
841
- # change.
833
+ # company or switches to a team that should be blocked from accessing
834
+ # top-secret documents. The user still has access to top-secret
835
+ # documents because the user had access when your documents were
836
+ # previously indexed. You can create a specific access control
837
+ # configuration for the user with deny access. You can later update the
838
+ # access control configuration to allow access if the user returns to
839
+ # the company and re-joins the 'top-secret' team. You can re-configure
840
+ # access control for your documents as circumstances change.
842
841
  #
843
842
  # To apply your access control configuration to certain documents, you
844
843
  # call the [BatchPutDocument][1] API with the
@@ -1091,6 +1090,7 @@ module Aws::Kendra
1091
1090
  # bucket: "S3BucketName", # required
1092
1091
  # key: "S3ObjectKey", # required
1093
1092
  # },
1093
+ # authentication_type: "HTTP_BASIC", # accepts HTTP_BASIC, OAUTH2
1094
1094
  # },
1095
1095
  # database_configuration: {
1096
1096
  # database_engine_type: "RDS_AURORA_MYSQL", # required, accepts RDS_AURORA_MYSQL, RDS_AURORA_POSTGRESQL, RDS_MYSQL, RDS_POSTGRESQL
@@ -2676,6 +2676,7 @@ module Aws::Kendra
2676
2676
  # resp.configuration.share_point_configuration.disable_local_groups #=> Boolean
2677
2677
  # resp.configuration.share_point_configuration.ssl_certificate_s3_path.bucket #=> String
2678
2678
  # resp.configuration.share_point_configuration.ssl_certificate_s3_path.key #=> String
2679
+ # resp.configuration.share_point_configuration.authentication_type #=> String, one of "HTTP_BASIC", "OAUTH2"
2679
2680
  # resp.configuration.database_configuration.database_engine_type #=> String, one of "RDS_AURORA_MYSQL", "RDS_AURORA_POSTGRESQL", "RDS_MYSQL", "RDS_POSTGRESQL"
2680
2681
  # resp.configuration.database_configuration.connection_configuration.database_host #=> String
2681
2682
  # resp.configuration.database_configuration.connection_configuration.database_port #=> Integer
@@ -3830,7 +3831,7 @@ module Aws::Kendra
3830
3831
  # The identifier of the index for the access control configuration.
3831
3832
  #
3832
3833
  # @option params [String] :next_token
3833
- # If the previous response was incomplete (because there is more data to
3834
+ # If the previous response was incomplete (because there's more data to
3834
3835
  # retrieve), Amazon Kendra returns a pagination token in the response.
3835
3836
  # You can use this pagination token to retrieve the next set of access
3836
3837
  # control configurations.
@@ -5093,7 +5094,7 @@ module Aws::Kendra
5093
5094
  # You call the [BatchPutDocument][1] API to apply the updated access
5094
5095
  # control configuration, with the `AccessControlConfigurationId`
5095
5096
  # included in the [Document][2] object. If you use an S3 bucket as a
5096
- # data source, you synchronize your data source to apply the the
5097
+ # data source, you synchronize your data source to apply the
5097
5098
  # `AccessControlConfigurationId` in the `.metadata.json` file. Amazon
5098
5099
  # Kendra currently only supports access control configuration for S3
5099
5100
  # data sources and documents indexed using the `BatchPutDocument` API.
@@ -5270,6 +5271,7 @@ module Aws::Kendra
5270
5271
  # bucket: "S3BucketName", # required
5271
5272
  # key: "S3ObjectKey", # required
5272
5273
  # },
5274
+ # authentication_type: "HTTP_BASIC", # accepts HTTP_BASIC, OAUTH2
5273
5275
  # },
5274
5276
  # database_configuration: {
5275
5277
  # database_engine_type: "RDS_AURORA_MYSQL", # required, accepts RDS_AURORA_MYSQL, RDS_AURORA_POSTGRESQL, RDS_MYSQL, RDS_POSTGRESQL
@@ -6318,7 +6320,7 @@ module Aws::Kendra
6318
6320
  params: params,
6319
6321
  config: config)
6320
6322
  context[:gem_name] = 'aws-sdk-kendra'
6321
- context[:gem_version] = '1.54.0'
6323
+ context[:gem_version] = '1.55.0'
6322
6324
  Seahorse::Client::Request.new(handlers, context)
6323
6325
  end
6324
6326
 
@@ -441,6 +441,7 @@ module Aws::Kendra
441
441
  ServiceNowServiceCatalogConfiguration = Shapes::StructureShape.new(name: 'ServiceNowServiceCatalogConfiguration')
442
442
  ServiceQuotaExceededException = Shapes::StructureShape.new(name: 'ServiceQuotaExceededException')
443
443
  SharePointConfiguration = Shapes::StructureShape.new(name: 'SharePointConfiguration')
444
+ SharePointOnlineAuthenticationType = Shapes::StringShape.new(name: 'SharePointOnlineAuthenticationType')
444
445
  SharePointUrlList = Shapes::ListShape.new(name: 'SharePointUrlList')
445
446
  SharePointVersion = Shapes::StringShape.new(name: 'SharePointVersion')
446
447
  SharedDriveId = Shapes::StringShape.new(name: 'SharedDriveId')
@@ -1901,6 +1902,7 @@ module Aws::Kendra
1901
1902
  SharePointConfiguration.add_member(:document_title_field_name, Shapes::ShapeRef.new(shape: DataSourceFieldName, location_name: "DocumentTitleFieldName"))
1902
1903
  SharePointConfiguration.add_member(:disable_local_groups, Shapes::ShapeRef.new(shape: Boolean, location_name: "DisableLocalGroups"))
1903
1904
  SharePointConfiguration.add_member(:ssl_certificate_s3_path, Shapes::ShapeRef.new(shape: S3Path, location_name: "SslCertificateS3Path"))
1905
+ SharePointConfiguration.add_member(:authentication_type, Shapes::ShapeRef.new(shape: SharePointOnlineAuthenticationType, location_name: "AuthenticationType"))
1904
1906
  SharePointConfiguration.struct_class = Types::SharePointConfiguration
1905
1907
 
1906
1908
  SharePointUrlList.member = Shapes::ShapeRef.new(shape: Url)
@@ -2439,6 +2439,7 @@ module Aws::Kendra
2439
2439
  # bucket: "S3BucketName", # required
2440
2440
  # key: "S3ObjectKey", # required
2441
2441
  # },
2442
+ # authentication_type: "HTTP_BASIC", # accepts HTTP_BASIC, OAUTH2
2442
2443
  # },
2443
2444
  # database_configuration: {
2444
2445
  # database_engine_type: "RDS_AURORA_MYSQL", # required, accepts RDS_AURORA_MYSQL, RDS_AURORA_POSTGRESQL, RDS_MYSQL, RDS_POSTGRESQL
@@ -3927,6 +3928,7 @@ module Aws::Kendra
3927
3928
  # bucket: "S3BucketName", # required
3928
3929
  # key: "S3ObjectKey", # required
3929
3930
  # },
3931
+ # authentication_type: "HTTP_BASIC", # accepts HTTP_BASIC, OAUTH2
3930
3932
  # },
3931
3933
  # database_configuration: {
3932
3934
  # database_engine_type: "RDS_AURORA_MYSQL", # required, accepts RDS_AURORA_MYSQL, RDS_AURORA_POSTGRESQL, RDS_MYSQL, RDS_POSTGRESQL
@@ -8750,7 +8752,7 @@ module Aws::Kendra
8750
8752
  # @return [String]
8751
8753
  #
8752
8754
  # @!attribute [rw] next_token
8753
- # If the previous response was incomplete (because there is more data
8755
+ # If the previous response was incomplete (because there's more data
8754
8756
  # to retrieve), Amazon Kendra returns a pagination token in the
8755
8757
  # response. You can use this pagination token to retrieve the next set
8756
8758
  # of access control configurations.
@@ -8771,9 +8773,9 @@ module Aws::Kendra
8771
8773
  end
8772
8774
 
8773
8775
  # @!attribute [rw] next_token
8774
- # If the response is truncated, Amazon Kendra returns this token that
8775
- # you can use in the subsequent request to retrieve the next set of
8776
- # access control configurations.
8776
+ # If the response is truncated, Amazon Kendra returns this token,
8777
+ # which you can use in the subsequent request to retrieve the next set
8778
+ # of access control configurations.
8777
8779
  # @return [String]
8778
8780
  #
8779
8781
  # @!attribute [rw] access_control_configurations
@@ -11763,6 +11765,7 @@ module Aws::Kendra
11763
11765
  # bucket: "S3BucketName", # required
11764
11766
  # key: "S3ObjectKey", # required
11765
11767
  # },
11768
+ # authentication_type: "HTTP_BASIC", # accepts HTTP_BASIC, OAUTH2
11766
11769
  # }
11767
11770
  #
11768
11771
  # @!attribute [rw] share_point_version
@@ -11781,9 +11784,14 @@ module Aws::Kendra
11781
11784
  # provide the sever domain name as part of the credentials. For more
11782
11785
  # information, see [Using a Microsoft SharePoint Data Source][1].
11783
11786
  #
11787
+ # You can also provide OAuth authentication credentials of user name,
11788
+ # password, client ID, and client secret. For more information, see
11789
+ # [Authentication for a SharePoint data source][2].
11790
+ #
11784
11791
  #
11785
11792
  #
11786
11793
  # [1]: https://docs.aws.amazon.com/kendra/latest/dg/data-source-sharepoint.html
11794
+ # [2]: https://docs.aws.amazon.com/kendra/latest/dg/data-source-sharepoint.html#sharepoint-authentication
11787
11795
  # @return [String]
11788
11796
  #
11789
11797
  # @!attribute [rw] crawl_attachments
@@ -11856,6 +11864,13 @@ module Aws::Kendra
11856
11864
  # use this to connect to SharePoint.
11857
11865
  # @return [Types::S3Path]
11858
11866
  #
11867
+ # @!attribute [rw] authentication_type
11868
+ # Whether you want to connect to SharePoint using basic authentication
11869
+ # of user name and password, or OAuth authentication of user name,
11870
+ # password, client ID, and client secret. You can use OAuth
11871
+ # authentication for SharePoint Online.
11872
+ # @return [String]
11873
+ #
11859
11874
  # @see http://docs.aws.amazon.com/goto/WebAPI/kendra-2019-02-03/SharePointConfiguration AWS API Documentation
11860
11875
  #
11861
11876
  class SharePointConfiguration < Struct.new(
@@ -11870,7 +11885,8 @@ module Aws::Kendra
11870
11885
  :field_mappings,
11871
11886
  :document_title_field_name,
11872
11887
  :disable_local_groups,
11873
- :ssl_certificate_s3_path)
11888
+ :ssl_certificate_s3_path,
11889
+ :authentication_type)
11874
11890
  SENSITIVE = []
11875
11891
  include Aws::Structure
11876
11892
  end
@@ -12790,6 +12806,7 @@ module Aws::Kendra
12790
12806
  # bucket: "S3BucketName", # required
12791
12807
  # key: "S3ObjectKey", # required
12792
12808
  # },
12809
+ # authentication_type: "HTTP_BASIC", # accepts HTTP_BASIC, OAUTH2
12793
12810
  # },
12794
12811
  # database_configuration: {
12795
12812
  # database_engine_type: "RDS_AURORA_MYSQL", # required, accepts RDS_AURORA_MYSQL, RDS_AURORA_POSTGRESQL, RDS_MYSQL, RDS_POSTGRESQL
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-kendra/customizations'
48
48
  # @!group service
49
49
  module Aws::Kendra
50
50
 
51
- GEM_VERSION = '1.54.0'
51
+ GEM_VERSION = '1.55.0'
52
52
 
53
53
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kendra
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.54.0
4
+ version: 1.55.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-07-14 00:00:00.000000000 Z
11
+ date: 2022-07-21 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core