aws-sdk-quicksight 1.165.0 → 1.166.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-quicksight/client.rb +286 -6
- data/lib/aws-sdk-quicksight/client_api.rb +204 -1
- data/lib/aws-sdk-quicksight/types.rb +744 -9
- data/lib/aws-sdk-quicksight.rb +1 -1
- data/sig/client.rbs +1505 -13
- data/sig/types.rbs +190 -0
- metadata +1 -1
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 1c9b82256405a0575899ffde51ed921531a6ccabc7eed59bab459b6e270645a4
|
|
4
|
+
data.tar.gz: 2a0429c5a567c830733c9d34baeeeac9f258e4b9cc883d76dabab2369a054711
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 350a53a4905e7131b742a457ebc0f21dd5acf864df2af0d38bc367383b79c46c93804b6f1d06a6c6f1dc6a2424dd2649d8079089d096f942b181a1c291978af2
|
|
7
|
+
data.tar.gz: cebcac75a44f0b0e5ca393487989df4795cfaa2aaae2865282c6cefe214c5cc012e3580967bce21bcf62dc4679b375d2aae568f97e585de51d0b7df318c5514b
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,11 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.166.0 (2025-12-11)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - This release adds new GetIdentityContext API, Dashboard customization options for tables and pivot tables, Visual styling options- borders and decals, map GeocodingPreferences, KeyPairCredentials for DataSourceCredentials. Snapshot APIs now support registered users. Parameters limit increased to 400
|
|
8
|
+
|
|
4
9
|
1.165.0 (2025-11-21)
|
|
5
10
|
------------------
|
|
6
11
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.166.0
|
|
@@ -3653,6 +3653,11 @@ module Aws::QuickSight
|
|
|
3653
3653
|
# },
|
|
3654
3654
|
# copy_source_arn: "CopySourceArn",
|
|
3655
3655
|
# secret_arn: "SecretArn",
|
|
3656
|
+
# key_pair_credentials: {
|
|
3657
|
+
# key_pair_username: "DbUsername", # required
|
|
3658
|
+
# private_key: "PrivateKey", # required
|
|
3659
|
+
# private_key_passphrase: "PrivateKeyPassphrase",
|
|
3660
|
+
# },
|
|
3656
3661
|
# web_proxy_credentials: {
|
|
3657
3662
|
# web_proxy_username: "DbUsername", # required
|
|
3658
3663
|
# web_proxy_password: "Password", # required
|
|
@@ -8010,6 +8015,23 @@ module Aws::QuickSight
|
|
|
8010
8015
|
# Poll job descriptions after a job starts to know the status of the
|
|
8011
8016
|
# job. For information on available status codes, see `JobStatus`.
|
|
8012
8017
|
#
|
|
8018
|
+
# **Registered user support**
|
|
8019
|
+
#
|
|
8020
|
+
# This API can be called as before to get status of a job started by the
|
|
8021
|
+
# same Quick Sight user.
|
|
8022
|
+
#
|
|
8023
|
+
# **Possible error scenarios**
|
|
8024
|
+
#
|
|
8025
|
+
# Request will fail with an Access Denied error in the following
|
|
8026
|
+
# scenarios:
|
|
8027
|
+
#
|
|
8028
|
+
# * The credentials have expired.
|
|
8029
|
+
#
|
|
8030
|
+
# * Job has been started by a different user.
|
|
8031
|
+
#
|
|
8032
|
+
# * Impersonated Quick Sight user doesn't have access to the specified
|
|
8033
|
+
# dashboard in the job.
|
|
8034
|
+
#
|
|
8013
8035
|
# @option params [required, String] :aws_account_id
|
|
8014
8036
|
# The ID of the Amazon Web Services account that the dashboard snapshot
|
|
8015
8037
|
# job is executed in.
|
|
@@ -8105,6 +8127,47 @@ module Aws::QuickSight
|
|
|
8105
8127
|
# that says `Dashboard Snapshot Job with id <SnapshotjobId> has not
|
|
8106
8128
|
# reached a terminal state.`.
|
|
8107
8129
|
#
|
|
8130
|
+
# **Registered user support**
|
|
8131
|
+
#
|
|
8132
|
+
# This API can be called as before to get the result of a job started by
|
|
8133
|
+
# the same Quick Sight user. The result for the user will be returned in
|
|
8134
|
+
# `RegisteredUsers` response attribute. The attribute will contain a
|
|
8135
|
+
# list with at most one object in it.
|
|
8136
|
+
#
|
|
8137
|
+
# **Possible error scenarios**
|
|
8138
|
+
#
|
|
8139
|
+
# The request fails with an Access Denied error in the following
|
|
8140
|
+
# scenarios:
|
|
8141
|
+
#
|
|
8142
|
+
# * The credentials have expired.
|
|
8143
|
+
#
|
|
8144
|
+
# * The job was started by a different user.
|
|
8145
|
+
#
|
|
8146
|
+
# * The registered user doesn't have access to the specified dashboard.
|
|
8147
|
+
#
|
|
8148
|
+
# The request succeeds but the job fails in the following scenarios:
|
|
8149
|
+
#
|
|
8150
|
+
# * `DASHBOARD_ACCESS_DENIED` - The registered user lost access to the
|
|
8151
|
+
# dashboard.
|
|
8152
|
+
#
|
|
8153
|
+
# * `CAPABILITY_RESTRICTED` - The registered user is restricted from
|
|
8154
|
+
# exporting data in **all** selected formats.
|
|
8155
|
+
#
|
|
8156
|
+
# The request succeeds but the response contains an error code in the
|
|
8157
|
+
# following scenarios:
|
|
8158
|
+
#
|
|
8159
|
+
# * `CAPABILITY_RESTRICTED` - The registered user is restricted from
|
|
8160
|
+
# exporting data in **some** selected formats.
|
|
8161
|
+
#
|
|
8162
|
+
# * `RLS_CHANGED` - Row-level security settings have changed. Re-run the
|
|
8163
|
+
# job with current settings.
|
|
8164
|
+
#
|
|
8165
|
+
# * `CLS_CHANGED` - Column-level security settings have changed. Re-run
|
|
8166
|
+
# the job with current settings.
|
|
8167
|
+
#
|
|
8168
|
+
# * `DATASET_DELETED` - The dataset has been deleted. Verify the dataset
|
|
8169
|
+
# exists before re-running the job.
|
|
8170
|
+
#
|
|
8108
8171
|
# @option params [required, String] :aws_account_id
|
|
8109
8172
|
# The ID of the Amazon Web Services account that the dashboard snapshot
|
|
8110
8173
|
# job is executed in.
|
|
@@ -8158,6 +8221,23 @@ module Aws::QuickSight
|
|
|
8158
8221
|
# resp.result.anonymous_users[0].file_groups[0].s3_results[0].error_info #=> Array
|
|
8159
8222
|
# resp.result.anonymous_users[0].file_groups[0].s3_results[0].error_info[0].error_message #=> String
|
|
8160
8223
|
# resp.result.anonymous_users[0].file_groups[0].s3_results[0].error_info[0].error_type #=> String
|
|
8224
|
+
# resp.result.registered_users #=> Array
|
|
8225
|
+
# resp.result.registered_users[0].file_groups #=> Array
|
|
8226
|
+
# resp.result.registered_users[0].file_groups[0].files #=> Array
|
|
8227
|
+
# resp.result.registered_users[0].file_groups[0].files[0].sheet_selections #=> Array
|
|
8228
|
+
# resp.result.registered_users[0].file_groups[0].files[0].sheet_selections[0].sheet_id #=> String
|
|
8229
|
+
# resp.result.registered_users[0].file_groups[0].files[0].sheet_selections[0].selection_scope #=> String, one of "ALL_VISUALS", "SELECTED_VISUALS"
|
|
8230
|
+
# resp.result.registered_users[0].file_groups[0].files[0].sheet_selections[0].visual_ids #=> Array
|
|
8231
|
+
# resp.result.registered_users[0].file_groups[0].files[0].sheet_selections[0].visual_ids[0] #=> String
|
|
8232
|
+
# resp.result.registered_users[0].file_groups[0].files[0].format_type #=> String, one of "CSV", "PDF", "EXCEL"
|
|
8233
|
+
# resp.result.registered_users[0].file_groups[0].s3_results #=> Array
|
|
8234
|
+
# resp.result.registered_users[0].file_groups[0].s3_results[0].s3_destination_configuration.bucket_configuration.bucket_name #=> String
|
|
8235
|
+
# resp.result.registered_users[0].file_groups[0].s3_results[0].s3_destination_configuration.bucket_configuration.bucket_prefix #=> String
|
|
8236
|
+
# resp.result.registered_users[0].file_groups[0].s3_results[0].s3_destination_configuration.bucket_configuration.bucket_region #=> String
|
|
8237
|
+
# resp.result.registered_users[0].file_groups[0].s3_results[0].s3_uri #=> String
|
|
8238
|
+
# resp.result.registered_users[0].file_groups[0].s3_results[0].error_info #=> Array
|
|
8239
|
+
# resp.result.registered_users[0].file_groups[0].s3_results[0].error_info[0].error_message #=> String
|
|
8240
|
+
# resp.result.registered_users[0].file_groups[0].s3_results[0].error_info[0].error_type #=> String
|
|
8161
8241
|
# resp.error_info.error_message #=> String
|
|
8162
8242
|
# resp.error_info.error_type #=> String
|
|
8163
8243
|
# resp.request_id #=> String
|
|
@@ -11324,6 +11404,110 @@ module Aws::QuickSight
|
|
|
11324
11404
|
req.send_request(options)
|
|
11325
11405
|
end
|
|
11326
11406
|
|
|
11407
|
+
# Retrieves the identity context for a Quick Sight user in a specified
|
|
11408
|
+
# namespace, allowing you to obtain identity tokens that can be used
|
|
11409
|
+
# with identity-enhanced IAM role sessions to call identity-aware APIs.
|
|
11410
|
+
#
|
|
11411
|
+
# Currently, you can call the following APIs with identity-enhanced
|
|
11412
|
+
# Credentials
|
|
11413
|
+
#
|
|
11414
|
+
# * [StartDashboardSnapshotJob][1]
|
|
11415
|
+
#
|
|
11416
|
+
# * [DescribeDashboardSnapshotJob][2]
|
|
11417
|
+
#
|
|
11418
|
+
# * [DescribeDashboardSnapshotJobResult][3]
|
|
11419
|
+
#
|
|
11420
|
+
# **Supported Authentication Methods**
|
|
11421
|
+
#
|
|
11422
|
+
# This API supports Quick Sight native users, IAM federated users, and
|
|
11423
|
+
# Active Directory users. For Quick Sight users authenticated by Amazon
|
|
11424
|
+
# Web Services Identity Center, see [Identity Center documentation on
|
|
11425
|
+
# identity-enhanced IAM role sessions][4].
|
|
11426
|
+
#
|
|
11427
|
+
# **Getting Identity-Enhanced Credentials**
|
|
11428
|
+
#
|
|
11429
|
+
# To obtain identity-enhanced credentials, follow these steps:
|
|
11430
|
+
#
|
|
11431
|
+
# * Call the GetIdentityContext API to retrieve an identity token for
|
|
11432
|
+
# the specified user.
|
|
11433
|
+
#
|
|
11434
|
+
# * Use the identity token with the [STS AssumeRole API][5] to obtain
|
|
11435
|
+
# identity-enhanced IAM role session credentials.
|
|
11436
|
+
#
|
|
11437
|
+
# **Usage with STS AssumeRole**
|
|
11438
|
+
#
|
|
11439
|
+
# The identity token returned by this API should be used with the STS
|
|
11440
|
+
# AssumeRole API to obtain credentials for an identity-enhanced IAM role
|
|
11441
|
+
# session. When calling AssumeRole, include the identity token in the
|
|
11442
|
+
# `ProvidedContexts` parameter with `ProviderArn` set to
|
|
11443
|
+
# `arn:aws:iam::aws:contextProvider/QuickSight` and `ContextAssertion`
|
|
11444
|
+
# set to the identity token received from this API.
|
|
11445
|
+
#
|
|
11446
|
+
# The assumed role must allow the `sts:SetContext` action in addition to
|
|
11447
|
+
# `sts:AssumeRole` in its trust relationship policy. The trust policy
|
|
11448
|
+
# should include both actions for the principal that will be assuming
|
|
11449
|
+
# the role.
|
|
11450
|
+
#
|
|
11451
|
+
#
|
|
11452
|
+
#
|
|
11453
|
+
# [1]: https://docs.aws.amazon.com/quicksight/latest/APIReference/API_StartDashboardSnapshotJob.html
|
|
11454
|
+
# [2]: https://docs.aws.amazon.com/quicksight/latest/APIReference/API_DescribeDashboardSnapshotJob.html
|
|
11455
|
+
# [3]: https://docs.aws.amazon.com/quicksight/latest/APIReference/API_DescribeDashboardSnapshotJobResult.html
|
|
11456
|
+
# [4]: https://docs.aws.amazon.com/singlesignon/latest/userguide/trustedidentitypropagation-identity-enhanced-iam-role-sessions.html
|
|
11457
|
+
# [5]: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
|
|
11458
|
+
#
|
|
11459
|
+
# @option params [required, String] :aws_account_id
|
|
11460
|
+
# The ID for the Amazon Web Services account that the user whose
|
|
11461
|
+
# identity context you want to retrieve is in. Currently, you use the ID
|
|
11462
|
+
# for the Amazon Web Services account that contains your Quick Sight
|
|
11463
|
+
# account.
|
|
11464
|
+
#
|
|
11465
|
+
# @option params [required, Types::UserIdentifier] :user_identifier
|
|
11466
|
+
# The identifier for the user whose identity context you want to
|
|
11467
|
+
# retrieve.
|
|
11468
|
+
#
|
|
11469
|
+
# @option params [String] :namespace
|
|
11470
|
+
# The namespace of the user that you want to get identity context for.
|
|
11471
|
+
# This parameter is required when the UserIdentifier is specified using
|
|
11472
|
+
# Email or UserName.
|
|
11473
|
+
#
|
|
11474
|
+
# @option params [Time,DateTime,Date,Integer,String] :session_expires_at
|
|
11475
|
+
# The timestamp at which the session will expire.
|
|
11476
|
+
#
|
|
11477
|
+
# @return [Types::GetIdentityContextResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
|
11478
|
+
#
|
|
11479
|
+
# * {Types::GetIdentityContextResponse#status #status} => Integer
|
|
11480
|
+
# * {Types::GetIdentityContextResponse#request_id #request_id} => String
|
|
11481
|
+
# * {Types::GetIdentityContextResponse#context #context} => String
|
|
11482
|
+
#
|
|
11483
|
+
# @example Request syntax with placeholder values
|
|
11484
|
+
#
|
|
11485
|
+
# resp = client.get_identity_context({
|
|
11486
|
+
# aws_account_id: "AwsAccountId", # required
|
|
11487
|
+
# user_identifier: { # required
|
|
11488
|
+
# user_name: "SensitiveString",
|
|
11489
|
+
# email: "SensitiveString",
|
|
11490
|
+
# user_arn: "Arn",
|
|
11491
|
+
# },
|
|
11492
|
+
# namespace: "Namespace",
|
|
11493
|
+
# session_expires_at: Time.now,
|
|
11494
|
+
# })
|
|
11495
|
+
#
|
|
11496
|
+
# @example Response structure
|
|
11497
|
+
#
|
|
11498
|
+
# resp.status #=> Integer
|
|
11499
|
+
# resp.request_id #=> String
|
|
11500
|
+
# resp.context #=> String
|
|
11501
|
+
#
|
|
11502
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/quicksight-2018-04-01/GetIdentityContext AWS API Documentation
|
|
11503
|
+
#
|
|
11504
|
+
# @overload get_identity_context(params = {})
|
|
11505
|
+
# @param [Hash] params ({})
|
|
11506
|
+
def get_identity_context(params = {}, options = {})
|
|
11507
|
+
req = build_request(:get_identity_context, params)
|
|
11508
|
+
req.send_request(options)
|
|
11509
|
+
end
|
|
11510
|
+
|
|
11327
11511
|
# Generates a session URL and authorization code that you can use to
|
|
11328
11512
|
# embed the Amazon Amazon Quick Sight console in your web server code.
|
|
11329
11513
|
# Use `GetSessionEmbedUrl` where you want to provide an authoring portal
|
|
@@ -15842,9 +16026,95 @@ module Aws::QuickSight
|
|
|
15842
16026
|
#
|
|
15843
16027
|
# * The size of the generated snapshots.
|
|
15844
16028
|
#
|
|
16029
|
+
# **Registered user support**
|
|
16030
|
+
#
|
|
16031
|
+
# You can generate snapshots for registered Quick Sight users by using
|
|
16032
|
+
# the Snapshot Job APIs with [identity-enhanced IAM role session
|
|
16033
|
+
# credentials][2]. This approach allows you to create snapshots on
|
|
16034
|
+
# behalf of specific Quick Sight users while respecting their row-level
|
|
16035
|
+
# security (RLS), column-level security (CLS), dynamic default
|
|
16036
|
+
# parameters and dashboard parameter/filter settings.
|
|
16037
|
+
#
|
|
16038
|
+
# To generate snapshots for registered Quick Sight users, you need to:
|
|
16039
|
+
#
|
|
16040
|
+
# * Obtain identity-enhanced IAM role session credentials from AWS
|
|
16041
|
+
# Security Token Service (STS).
|
|
16042
|
+
#
|
|
16043
|
+
# * Use these credentials to call the Snapshot Job APIs.
|
|
16044
|
+
#
|
|
16045
|
+
# Identity-enhanced credentials are credentials that contain information
|
|
16046
|
+
# about the end user (e.g., registered Quick Sight user).
|
|
16047
|
+
#
|
|
16048
|
+
# If your Quick Sight users are backed by [AWS Identity Center][3], then
|
|
16049
|
+
# you need to set up a [trusted token issuer][4]. Then, getting
|
|
16050
|
+
# identity-enhanced IAM credentials for a Quick Sight user will look
|
|
16051
|
+
# like the following:
|
|
16052
|
+
#
|
|
16053
|
+
# * Authenticate user with your OIDC compliant Identity Provider. You
|
|
16054
|
+
# should get auth tokens back.
|
|
16055
|
+
#
|
|
16056
|
+
# * Use the OIDC API, [CreateTokenWithIAM][5], to exchange auth tokens
|
|
16057
|
+
# to IAM tokens. One of the resulted tokens will be identity token.
|
|
16058
|
+
#
|
|
16059
|
+
# * Call STS AssumeRole API as you normally would, but provide an extra
|
|
16060
|
+
# `ProvidedContexts` parameter in the API request. The list of
|
|
16061
|
+
# contexts must have a single trusted context assertion. The
|
|
16062
|
+
# `ProviderArn` should be
|
|
16063
|
+
# `arn:aws:iam::aws:contextProvider/IdentityCenter` while
|
|
16064
|
+
# `ContextAssertion` will be the identity token you received in
|
|
16065
|
+
# response from CreateTokenWithIAM
|
|
16066
|
+
#
|
|
16067
|
+
# For more details, see [IdC documentation on Identity-enhanced IAM role
|
|
16068
|
+
# sessions][2].
|
|
16069
|
+
#
|
|
16070
|
+
# To obtain Identity-enhanced credentials for Quick Sight native users,
|
|
16071
|
+
# IAM federated users, or Active Directory users, follow the steps
|
|
16072
|
+
# below:
|
|
16073
|
+
#
|
|
16074
|
+
# * Call Quick Sight [GetIdentityContext API][6] to get identity token.
|
|
16075
|
+
#
|
|
16076
|
+
# * Call STS AssumeRole API as you normally would, but provide extra
|
|
16077
|
+
# `ProvidedContexts` parameter in the API request. The list of
|
|
16078
|
+
# contexts must have a single trusted context assertion. The
|
|
16079
|
+
# `ProviderArn` should be
|
|
16080
|
+
# `arn:aws:iam::aws:contextProvider/QuickSight` while
|
|
16081
|
+
# `ContextAssertion` will be the identity token you received in
|
|
16082
|
+
# response from GetIdentityContext
|
|
16083
|
+
#
|
|
16084
|
+
# After obtaining the identity-enhanced IAM role session credentials,
|
|
16085
|
+
# you can use them to start a job, describe the job and describe job
|
|
16086
|
+
# result. You can use the same credentials as long as they haven't
|
|
16087
|
+
# expired. All API requests made with these credentials are considered
|
|
16088
|
+
# to be made by the impersonated Quick Sight user.
|
|
16089
|
+
#
|
|
16090
|
+
# When using identity-enhanced session credentials, set the
|
|
16091
|
+
# UserConfiguration request attribute to null. Otherwise, the request
|
|
16092
|
+
# will be invalid.
|
|
16093
|
+
#
|
|
16094
|
+
# **Possible error scenarios**
|
|
16095
|
+
#
|
|
16096
|
+
# The request fails with an Access Denied error in the following
|
|
16097
|
+
# scenarios:
|
|
16098
|
+
#
|
|
16099
|
+
# * The credentials have expired.
|
|
16100
|
+
#
|
|
16101
|
+
# * The impersonated Quick Sight user doesn't have access to the
|
|
16102
|
+
# specified dashboard.
|
|
16103
|
+
#
|
|
16104
|
+
# * The impersonated Quick Sight user is restricted from exporting data
|
|
16105
|
+
# in the selected formats. For more information about export
|
|
16106
|
+
# restrictions, see [Customizing access to Amazon Quick Sight
|
|
16107
|
+
# capabilities][7].
|
|
16108
|
+
#
|
|
15845
16109
|
#
|
|
15846
16110
|
#
|
|
15847
16111
|
# [1]: http://aws.amazon.com/contact-us/
|
|
16112
|
+
# [2]: https://docs.aws.amazon.com/singlesignon/latest/userguide/trustedidentitypropagation-identity-enhanced-iam-role-sessions.html
|
|
16113
|
+
# [3]: https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html
|
|
16114
|
+
# [4]: https://docs.aws.amazon.com/singlesignon/latest/userguide/setuptrustedtokenissuer.html
|
|
16115
|
+
# [5]: https://docs.aws.amazon.com/singlesignon/latest/OIDCAPIReference/API_CreateTokenWithIAM.html
|
|
16116
|
+
# [6]: https://docs.aws.amazon.com/quicksight/latest/APIReference/API_GetIdentityContext.html
|
|
16117
|
+
# [7]: https://docs.aws.amazon.com/quicksuite/latest/userguide/create-custom-permisions-profile.html
|
|
15848
16118
|
#
|
|
15849
16119
|
# @option params [required, String] :aws_account_id
|
|
15850
16120
|
# The ID of the Amazon Web Services account that the dashboard snapshot
|
|
@@ -15860,10 +16130,15 @@ module Aws::QuickSight
|
|
|
15860
16130
|
# runs. You can reuse this ID for another job 24 hours after the current
|
|
15861
16131
|
# job is completed.
|
|
15862
16132
|
#
|
|
15863
|
-
# @option params [
|
|
15864
|
-
# A structure that contains information about the
|
|
15865
|
-
#
|
|
15866
|
-
#
|
|
16133
|
+
# @option params [Types::SnapshotUserConfiguration] :user_configuration
|
|
16134
|
+
# A structure that contains information about the users that the
|
|
16135
|
+
# dashboard snapshot is generated for. The users can be either anonymous
|
|
16136
|
+
# users or registered users. Anonymous users cannot be used together
|
|
16137
|
+
# with registered users.
|
|
16138
|
+
#
|
|
16139
|
+
# When using identity-enhanced session credentials, set the
|
|
16140
|
+
# UserConfiguration request attribute to null. Otherwise, the request
|
|
16141
|
+
# will be invalid.
|
|
15867
16142
|
#
|
|
15868
16143
|
# @option params [required, Types::SnapshotConfiguration] :snapshot_configuration
|
|
15869
16144
|
# A structure that describes the configuration of the dashboard
|
|
@@ -15882,7 +16157,7 @@ module Aws::QuickSight
|
|
|
15882
16157
|
# aws_account_id: "AwsAccountId", # required
|
|
15883
16158
|
# dashboard_id: "ShortRestrictiveResourceId", # required
|
|
15884
16159
|
# snapshot_job_id: "ShortRestrictiveResourceId", # required
|
|
15885
|
-
# user_configuration: {
|
|
16160
|
+
# user_configuration: {
|
|
15886
16161
|
# anonymous_users: [
|
|
15887
16162
|
# {
|
|
15888
16163
|
# row_level_permission_tags: [
|
|
@@ -18552,6 +18827,11 @@ module Aws::QuickSight
|
|
|
18552
18827
|
# },
|
|
18553
18828
|
# copy_source_arn: "CopySourceArn",
|
|
18554
18829
|
# secret_arn: "SecretArn",
|
|
18830
|
+
# key_pair_credentials: {
|
|
18831
|
+
# key_pair_username: "DbUsername", # required
|
|
18832
|
+
# private_key: "PrivateKey", # required
|
|
18833
|
+
# private_key_passphrase: "PrivateKeyPassphrase",
|
|
18834
|
+
# },
|
|
18555
18835
|
# web_proxy_credentials: {
|
|
18556
18836
|
# web_proxy_username: "DbUsername", # required
|
|
18557
18837
|
# web_proxy_password: "Password", # required
|
|
@@ -20656,7 +20936,7 @@ module Aws::QuickSight
|
|
|
20656
20936
|
tracer: tracer
|
|
20657
20937
|
)
|
|
20658
20938
|
context[:gem_name] = 'aws-sdk-quicksight'
|
|
20659
|
-
context[:gem_version] = '1.
|
|
20939
|
+
context[:gem_version] = '1.166.0'
|
|
20660
20940
|
Seahorse::Client::Request.new(handlers, context)
|
|
20661
20941
|
end
|
|
20662
20942
|
|