aws-sdk-quicksight 1.165.0 → 1.166.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 222268dddda50ef3485ac21316c5b48a387b24931176504e4d57606a4f6a48fd
4
- data.tar.gz: 0fccacea0454c80538e9def5dac795db9ab7fb914a6e258aa1c28b7c6082783d
3
+ metadata.gz: 1c9b82256405a0575899ffde51ed921531a6ccabc7eed59bab459b6e270645a4
4
+ data.tar.gz: 2a0429c5a567c830733c9d34baeeeac9f258e4b9cc883d76dabab2369a054711
5
5
  SHA512:
6
- metadata.gz: efa1b534bbd8d384de01e9f9b9408fbefa686eb1836b3a90398adf65885a7badf31956dbb607f16c2f73fddb27cb57dc50a1449402792f64123b2bcf2ddfbaad
7
- data.tar.gz: 19b4213449bb6b7b483ca06ed88abdfb05785d17169d6f83f637f3e86178a3467a603c8cc542d99f395fde026e6e38b8b0d346f2d6c9f82377aa6cc5fe5469a7
6
+ metadata.gz: 350a53a4905e7131b742a457ebc0f21dd5acf864df2af0d38bc367383b79c46c93804b6f1d06a6c6f1dc6a2424dd2649d8079089d096f942b181a1c291978af2
7
+ data.tar.gz: cebcac75a44f0b0e5ca393487989df4795cfaa2aaae2865282c6cefe214c5cc012e3580967bce21bcf62dc4679b375d2aae568f97e585de51d0b7df318c5514b
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.166.0 (2025-12-11)
5
+ ------------------
6
+
7
+ * Feature - This release adds new GetIdentityContext API, Dashboard customization options for tables and pivot tables, Visual styling options- borders and decals, map GeocodingPreferences, KeyPairCredentials for DataSourceCredentials. Snapshot APIs now support registered users. Parameters limit increased to 400
8
+
4
9
  1.165.0 (2025-11-21)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.165.0
1
+ 1.166.0
@@ -3653,6 +3653,11 @@ module Aws::QuickSight
3653
3653
  # },
3654
3654
  # copy_source_arn: "CopySourceArn",
3655
3655
  # secret_arn: "SecretArn",
3656
+ # key_pair_credentials: {
3657
+ # key_pair_username: "DbUsername", # required
3658
+ # private_key: "PrivateKey", # required
3659
+ # private_key_passphrase: "PrivateKeyPassphrase",
3660
+ # },
3656
3661
  # web_proxy_credentials: {
3657
3662
  # web_proxy_username: "DbUsername", # required
3658
3663
  # web_proxy_password: "Password", # required
@@ -8010,6 +8015,23 @@ module Aws::QuickSight
8010
8015
  # Poll job descriptions after a job starts to know the status of the
8011
8016
  # job. For information on available status codes, see `JobStatus`.
8012
8017
  #
8018
+ # **Registered user support**
8019
+ #
8020
+ # This API can be called as before to get status of a job started by the
8021
+ # same Quick Sight user.
8022
+ #
8023
+ # **Possible error scenarios**
8024
+ #
8025
+ # Request will fail with an Access Denied error in the following
8026
+ # scenarios:
8027
+ #
8028
+ # * The credentials have expired.
8029
+ #
8030
+ # * Job has been started by a different user.
8031
+ #
8032
+ # * Impersonated Quick Sight user doesn't have access to the specified
8033
+ # dashboard in the job.
8034
+ #
8013
8035
  # @option params [required, String] :aws_account_id
8014
8036
  # The ID of the Amazon Web Services account that the dashboard snapshot
8015
8037
  # job is executed in.
@@ -8105,6 +8127,47 @@ module Aws::QuickSight
8105
8127
  # that says `Dashboard Snapshot Job with id <SnapshotjobId> has not
8106
8128
  # reached a terminal state.`.
8107
8129
  #
8130
+ # **Registered user support**
8131
+ #
8132
+ # This API can be called as before to get the result of a job started by
8133
+ # the same Quick Sight user. The result for the user will be returned in
8134
+ # `RegisteredUsers` response attribute. The attribute will contain a
8135
+ # list with at most one object in it.
8136
+ #
8137
+ # **Possible error scenarios**
8138
+ #
8139
+ # The request fails with an Access Denied error in the following
8140
+ # scenarios:
8141
+ #
8142
+ # * The credentials have expired.
8143
+ #
8144
+ # * The job was started by a different user.
8145
+ #
8146
+ # * The registered user doesn't have access to the specified dashboard.
8147
+ #
8148
+ # The request succeeds but the job fails in the following scenarios:
8149
+ #
8150
+ # * `DASHBOARD_ACCESS_DENIED` - The registered user lost access to the
8151
+ # dashboard.
8152
+ #
8153
+ # * `CAPABILITY_RESTRICTED` - The registered user is restricted from
8154
+ # exporting data in **all** selected formats.
8155
+ #
8156
+ # The request succeeds but the response contains an error code in the
8157
+ # following scenarios:
8158
+ #
8159
+ # * `CAPABILITY_RESTRICTED` - The registered user is restricted from
8160
+ # exporting data in **some** selected formats.
8161
+ #
8162
+ # * `RLS_CHANGED` - Row-level security settings have changed. Re-run the
8163
+ # job with current settings.
8164
+ #
8165
+ # * `CLS_CHANGED` - Column-level security settings have changed. Re-run
8166
+ # the job with current settings.
8167
+ #
8168
+ # * `DATASET_DELETED` - The dataset has been deleted. Verify the dataset
8169
+ # exists before re-running the job.
8170
+ #
8108
8171
  # @option params [required, String] :aws_account_id
8109
8172
  # The ID of the Amazon Web Services account that the dashboard snapshot
8110
8173
  # job is executed in.
@@ -8158,6 +8221,23 @@ module Aws::QuickSight
8158
8221
  # resp.result.anonymous_users[0].file_groups[0].s3_results[0].error_info #=> Array
8159
8222
  # resp.result.anonymous_users[0].file_groups[0].s3_results[0].error_info[0].error_message #=> String
8160
8223
  # resp.result.anonymous_users[0].file_groups[0].s3_results[0].error_info[0].error_type #=> String
8224
+ # resp.result.registered_users #=> Array
8225
+ # resp.result.registered_users[0].file_groups #=> Array
8226
+ # resp.result.registered_users[0].file_groups[0].files #=> Array
8227
+ # resp.result.registered_users[0].file_groups[0].files[0].sheet_selections #=> Array
8228
+ # resp.result.registered_users[0].file_groups[0].files[0].sheet_selections[0].sheet_id #=> String
8229
+ # resp.result.registered_users[0].file_groups[0].files[0].sheet_selections[0].selection_scope #=> String, one of "ALL_VISUALS", "SELECTED_VISUALS"
8230
+ # resp.result.registered_users[0].file_groups[0].files[0].sheet_selections[0].visual_ids #=> Array
8231
+ # resp.result.registered_users[0].file_groups[0].files[0].sheet_selections[0].visual_ids[0] #=> String
8232
+ # resp.result.registered_users[0].file_groups[0].files[0].format_type #=> String, one of "CSV", "PDF", "EXCEL"
8233
+ # resp.result.registered_users[0].file_groups[0].s3_results #=> Array
8234
+ # resp.result.registered_users[0].file_groups[0].s3_results[0].s3_destination_configuration.bucket_configuration.bucket_name #=> String
8235
+ # resp.result.registered_users[0].file_groups[0].s3_results[0].s3_destination_configuration.bucket_configuration.bucket_prefix #=> String
8236
+ # resp.result.registered_users[0].file_groups[0].s3_results[0].s3_destination_configuration.bucket_configuration.bucket_region #=> String
8237
+ # resp.result.registered_users[0].file_groups[0].s3_results[0].s3_uri #=> String
8238
+ # resp.result.registered_users[0].file_groups[0].s3_results[0].error_info #=> Array
8239
+ # resp.result.registered_users[0].file_groups[0].s3_results[0].error_info[0].error_message #=> String
8240
+ # resp.result.registered_users[0].file_groups[0].s3_results[0].error_info[0].error_type #=> String
8161
8241
  # resp.error_info.error_message #=> String
8162
8242
  # resp.error_info.error_type #=> String
8163
8243
  # resp.request_id #=> String
@@ -11324,6 +11404,110 @@ module Aws::QuickSight
11324
11404
  req.send_request(options)
11325
11405
  end
11326
11406
 
11407
+ # Retrieves the identity context for a Quick Sight user in a specified
11408
+ # namespace, allowing you to obtain identity tokens that can be used
11409
+ # with identity-enhanced IAM role sessions to call identity-aware APIs.
11410
+ #
11411
+ # Currently, you can call the following APIs with identity-enhanced
11412
+ # Credentials
11413
+ #
11414
+ # * [StartDashboardSnapshotJob][1]
11415
+ #
11416
+ # * [DescribeDashboardSnapshotJob][2]
11417
+ #
11418
+ # * [DescribeDashboardSnapshotJobResult][3]
11419
+ #
11420
+ # **Supported Authentication Methods**
11421
+ #
11422
+ # This API supports Quick Sight native users, IAM federated users, and
11423
+ # Active Directory users. For Quick Sight users authenticated by Amazon
11424
+ # Web Services Identity Center, see [Identity Center documentation on
11425
+ # identity-enhanced IAM role sessions][4].
11426
+ #
11427
+ # **Getting Identity-Enhanced Credentials**
11428
+ #
11429
+ # To obtain identity-enhanced credentials, follow these steps:
11430
+ #
11431
+ # * Call the GetIdentityContext API to retrieve an identity token for
11432
+ # the specified user.
11433
+ #
11434
+ # * Use the identity token with the [STS AssumeRole API][5] to obtain
11435
+ # identity-enhanced IAM role session credentials.
11436
+ #
11437
+ # **Usage with STS AssumeRole**
11438
+ #
11439
+ # The identity token returned by this API should be used with the STS
11440
+ # AssumeRole API to obtain credentials for an identity-enhanced IAM role
11441
+ # session. When calling AssumeRole, include the identity token in the
11442
+ # `ProvidedContexts` parameter with `ProviderArn` set to
11443
+ # `arn:aws:iam::aws:contextProvider/QuickSight` and `ContextAssertion`
11444
+ # set to the identity token received from this API.
11445
+ #
11446
+ # The assumed role must allow the `sts:SetContext` action in addition to
11447
+ # `sts:AssumeRole` in its trust relationship policy. The trust policy
11448
+ # should include both actions for the principal that will be assuming
11449
+ # the role.
11450
+ #
11451
+ #
11452
+ #
11453
+ # [1]: https://docs.aws.amazon.com/quicksight/latest/APIReference/API_StartDashboardSnapshotJob.html
11454
+ # [2]: https://docs.aws.amazon.com/quicksight/latest/APIReference/API_DescribeDashboardSnapshotJob.html
11455
+ # [3]: https://docs.aws.amazon.com/quicksight/latest/APIReference/API_DescribeDashboardSnapshotJobResult.html
11456
+ # [4]: https://docs.aws.amazon.com/singlesignon/latest/userguide/trustedidentitypropagation-identity-enhanced-iam-role-sessions.html
11457
+ # [5]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
11458
+ #
11459
+ # @option params [required, String] :aws_account_id
11460
+ # The ID for the Amazon Web Services account that the user whose
11461
+ # identity context you want to retrieve is in. Currently, you use the ID
11462
+ # for the Amazon Web Services account that contains your Quick Sight
11463
+ # account.
11464
+ #
11465
+ # @option params [required, Types::UserIdentifier] :user_identifier
11466
+ # The identifier for the user whose identity context you want to
11467
+ # retrieve.
11468
+ #
11469
+ # @option params [String] :namespace
11470
+ # The namespace of the user that you want to get identity context for.
11471
+ # This parameter is required when the UserIdentifier is specified using
11472
+ # Email or UserName.
11473
+ #
11474
+ # @option params [Time,DateTime,Date,Integer,String] :session_expires_at
11475
+ # The timestamp at which the session will expire.
11476
+ #
11477
+ # @return [Types::GetIdentityContextResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
11478
+ #
11479
+ # * {Types::GetIdentityContextResponse#status #status} => Integer
11480
+ # * {Types::GetIdentityContextResponse#request_id #request_id} => String
11481
+ # * {Types::GetIdentityContextResponse#context #context} => String
11482
+ #
11483
+ # @example Request syntax with placeholder values
11484
+ #
11485
+ # resp = client.get_identity_context({
11486
+ # aws_account_id: "AwsAccountId", # required
11487
+ # user_identifier: { # required
11488
+ # user_name: "SensitiveString",
11489
+ # email: "SensitiveString",
11490
+ # user_arn: "Arn",
11491
+ # },
11492
+ # namespace: "Namespace",
11493
+ # session_expires_at: Time.now,
11494
+ # })
11495
+ #
11496
+ # @example Response structure
11497
+ #
11498
+ # resp.status #=> Integer
11499
+ # resp.request_id #=> String
11500
+ # resp.context #=> String
11501
+ #
11502
+ # @see http://docs.aws.amazon.com/goto/WebAPI/quicksight-2018-04-01/GetIdentityContext AWS API Documentation
11503
+ #
11504
+ # @overload get_identity_context(params = {})
11505
+ # @param [Hash] params ({})
11506
+ def get_identity_context(params = {}, options = {})
11507
+ req = build_request(:get_identity_context, params)
11508
+ req.send_request(options)
11509
+ end
11510
+
11327
11511
  # Generates a session URL and authorization code that you can use to
11328
11512
  # embed the Amazon Amazon Quick Sight console in your web server code.
11329
11513
  # Use `GetSessionEmbedUrl` where you want to provide an authoring portal
@@ -15842,9 +16026,95 @@ module Aws::QuickSight
15842
16026
  #
15843
16027
  # * The size of the generated snapshots.
15844
16028
  #
16029
+ # **Registered user support**
16030
+ #
16031
+ # You can generate snapshots for registered Quick Sight users by using
16032
+ # the Snapshot Job APIs with [identity-enhanced IAM role session
16033
+ # credentials][2]. This approach allows you to create snapshots on
16034
+ # behalf of specific Quick Sight users while respecting their row-level
16035
+ # security (RLS), column-level security (CLS), dynamic default
16036
+ # parameters and dashboard parameter/filter settings.
16037
+ #
16038
+ # To generate snapshots for registered Quick Sight users, you need to:
16039
+ #
16040
+ # * Obtain identity-enhanced IAM role session credentials from AWS
16041
+ # Security Token Service (STS).
16042
+ #
16043
+ # * Use these credentials to call the Snapshot Job APIs.
16044
+ #
16045
+ # Identity-enhanced credentials are credentials that contain information
16046
+ # about the end user (e.g., registered Quick Sight user).
16047
+ #
16048
+ # If your Quick Sight users are backed by [AWS Identity Center][3], then
16049
+ # you need to set up a [trusted token issuer][4]. Then, getting
16050
+ # identity-enhanced IAM credentials for a Quick Sight user will look
16051
+ # like the following:
16052
+ #
16053
+ # * Authenticate user with your OIDC compliant Identity Provider. You
16054
+ # should get auth tokens back.
16055
+ #
16056
+ # * Use the OIDC API, [CreateTokenWithIAM][5], to exchange auth tokens
16057
+ # to IAM tokens. One of the resulted tokens will be identity token.
16058
+ #
16059
+ # * Call STS AssumeRole API as you normally would, but provide an extra
16060
+ # `ProvidedContexts` parameter in the API request. The list of
16061
+ # contexts must have a single trusted context assertion. The
16062
+ # `ProviderArn` should be
16063
+ # `arn:aws:iam::aws:contextProvider/IdentityCenter` while
16064
+ # `ContextAssertion` will be the identity token you received in
16065
+ # response from CreateTokenWithIAM
16066
+ #
16067
+ # For more details, see [IdC documentation on Identity-enhanced IAM role
16068
+ # sessions][2].
16069
+ #
16070
+ # To obtain Identity-enhanced credentials for Quick Sight native users,
16071
+ # IAM federated users, or Active Directory users, follow the steps
16072
+ # below:
16073
+ #
16074
+ # * Call Quick Sight [GetIdentityContext API][6] to get identity token.
16075
+ #
16076
+ # * Call STS AssumeRole API as you normally would, but provide extra
16077
+ # `ProvidedContexts` parameter in the API request. The list of
16078
+ # contexts must have a single trusted context assertion. The
16079
+ # `ProviderArn` should be
16080
+ # `arn:aws:iam::aws:contextProvider/QuickSight` while
16081
+ # `ContextAssertion` will be the identity token you received in
16082
+ # response from GetIdentityContext
16083
+ #
16084
+ # After obtaining the identity-enhanced IAM role session credentials,
16085
+ # you can use them to start a job, describe the job and describe job
16086
+ # result. You can use the same credentials as long as they haven't
16087
+ # expired. All API requests made with these credentials are considered
16088
+ # to be made by the impersonated Quick Sight user.
16089
+ #
16090
+ # When using identity-enhanced session credentials, set the
16091
+ # UserConfiguration request attribute to null. Otherwise, the request
16092
+ # will be invalid.
16093
+ #
16094
+ # **Possible error scenarios**
16095
+ #
16096
+ # The request fails with an Access Denied error in the following
16097
+ # scenarios:
16098
+ #
16099
+ # * The credentials have expired.
16100
+ #
16101
+ # * The impersonated Quick Sight user doesn't have access to the
16102
+ # specified dashboard.
16103
+ #
16104
+ # * The impersonated Quick Sight user is restricted from exporting data
16105
+ # in the selected formats. For more information about export
16106
+ # restrictions, see [Customizing access to Amazon Quick Sight
16107
+ # capabilities][7].
16108
+ #
15845
16109
  #
15846
16110
  #
15847
16111
  # [1]: http://aws.amazon.com/contact-us/
16112
+ # [2]: https://docs.aws.amazon.com/singlesignon/latest/userguide/trustedidentitypropagation-identity-enhanced-iam-role-sessions.html
16113
+ # [3]: https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html
16114
+ # [4]: https://docs.aws.amazon.com/singlesignon/latest/userguide/setuptrustedtokenissuer.html
16115
+ # [5]: https://docs.aws.amazon.com/singlesignon/latest/OIDCAPIReference/API_CreateTokenWithIAM.html
16116
+ # [6]: https://docs.aws.amazon.com/quicksight/latest/APIReference/API_GetIdentityContext.html
16117
+ # [7]: https://docs.aws.amazon.com/quicksuite/latest/userguide/create-custom-permisions-profile.html
15848
16118
  #
15849
16119
  # @option params [required, String] :aws_account_id
15850
16120
  # The ID of the Amazon Web Services account that the dashboard snapshot
@@ -15860,10 +16130,15 @@ module Aws::QuickSight
15860
16130
  # runs. You can reuse this ID for another job 24 hours after the current
15861
16131
  # job is completed.
15862
16132
  #
15863
- # @option params [required, Types::SnapshotUserConfiguration] :user_configuration
15864
- # A structure that contains information about the anonymous users that
15865
- # the generated snapshot is for. This API will not return information
15866
- # about registered Amazon Quick Sight.
16133
+ # @option params [Types::SnapshotUserConfiguration] :user_configuration
16134
+ # A structure that contains information about the users that the
16135
+ # dashboard snapshot is generated for. The users can be either anonymous
16136
+ # users or registered users. Anonymous users cannot be used together
16137
+ # with registered users.
16138
+ #
16139
+ # When using identity-enhanced session credentials, set the
16140
+ # UserConfiguration request attribute to null. Otherwise, the request
16141
+ # will be invalid.
15867
16142
  #
15868
16143
  # @option params [required, Types::SnapshotConfiguration] :snapshot_configuration
15869
16144
  # A structure that describes the configuration of the dashboard
@@ -15882,7 +16157,7 @@ module Aws::QuickSight
15882
16157
  # aws_account_id: "AwsAccountId", # required
15883
16158
  # dashboard_id: "ShortRestrictiveResourceId", # required
15884
16159
  # snapshot_job_id: "ShortRestrictiveResourceId", # required
15885
- # user_configuration: { # required
16160
+ # user_configuration: {
15886
16161
  # anonymous_users: [
15887
16162
  # {
15888
16163
  # row_level_permission_tags: [
@@ -18552,6 +18827,11 @@ module Aws::QuickSight
18552
18827
  # },
18553
18828
  # copy_source_arn: "CopySourceArn",
18554
18829
  # secret_arn: "SecretArn",
18830
+ # key_pair_credentials: {
18831
+ # key_pair_username: "DbUsername", # required
18832
+ # private_key: "PrivateKey", # required
18833
+ # private_key_passphrase: "PrivateKeyPassphrase",
18834
+ # },
18555
18835
  # web_proxy_credentials: {
18556
18836
  # web_proxy_username: "DbUsername", # required
18557
18837
  # web_proxy_password: "Password", # required
@@ -20656,7 +20936,7 @@ module Aws::QuickSight
20656
20936
  tracer: tracer
20657
20937
  )
20658
20938
  context[:gem_name] = 'aws-sdk-quicksight'
20659
- context[:gem_version] = '1.165.0'
20939
+ context[:gem_version] = '1.166.0'
20660
20940
  Seahorse::Client::Request.new(handlers, context)
20661
20941
  end
20662
20942