lib/aws-sdk-neptunedata/client.rb in aws-sdk-neptunedata-1.4.0 vs lib/aws-sdk-neptunedata/client.rb in aws-sdk-neptunedata-1.5.0
- old
+ new
@@ -1157,11 +1157,11 @@
# When invoking this operation in a Neptune cluster that has IAM
# authentication enabled, the IAM user or role making the request must
# have a policy attached that allows the
# [neptune-db:ReadDataViaQuery][2] IAM action in that cluster.
#
- # Note that the [neptune-db:QueryLanguage:Opencypher][3] IAM condition
+ # Note that the [neptune-db:QueryLanguage:OpenCypher][3] IAM condition
# key can be used in the policy document to restrict the use of
# openCypher queries (see [Condition keys available in Neptune IAM
# data-access policy statements][4]).
#
#
@@ -1228,11 +1228,11 @@
#
# * [neptune-db:WriteDataViaQuery][4]
#
# * [neptune-db:DeleteDataViaQuery][5]
#
- # Note also that the [neptune-db:QueryLanguage:Opencypher][6] IAM
+ # Note also that the [neptune-db:QueryLanguage:OpenCypher][6] IAM
# condition key can be used in the policy document to restrict the use
# of openCypher queries (see [Condition keys available in Neptune IAM
# data-access policy statements][7]).
#
#
@@ -1707,11 +1707,11 @@
# When invoking this operation in a Neptune cluster that has IAM
# authentication enabled, the IAM user or role making the request must
# have a policy attached that allows the [neptune-db:GetQueryStatus][1]
# IAM action in that cluster.
#
- # Note that the [neptune-db:QueryLanguage:Opencypher][2] IAM condition
+ # Note that the [neptune-db:QueryLanguage:OpenCypher][2] IAM condition
# key can be used in the policy document to restrict the use of
# openCypher queries (see [Condition keys available in Neptune IAM
# data-access policy statements][3]).
#
#
@@ -1816,11 +1816,11 @@
# Note that you can restrict property-graph queries using the following
# IAM context keys:
#
# * [neptune-db:QueryLanguage:Gremlin][4]
#
- # * [neptune-db:QueryLanguage:Opencypher][4]
+ # * [neptune-db:QueryLanguage:OpenCypher][4]
#
# See [Condition keys available in Neptune IAM data-access policy
# statements][5]).
#
#
@@ -2481,11 +2481,11 @@
# When invoking this operation in a Neptune cluster that has IAM
# authentication enabled, the IAM user or role making the request must
# have a policy attached that allows the [neptune-db:GetQueryStatus][2]
# IAM action in that cluster.
#
- # Note that the [neptune-db:QueryLanguage:Opencypher][3] IAM condition
+ # Note that the [neptune-db:QueryLanguage:OpenCypher][3] IAM condition
# key can be used in the policy document to restrict the use of
# openCypher queries (see [Condition keys available in Neptune IAM
# data-access policy statements][4]).
#
#
@@ -2832,11 +2832,12 @@
# request can be queued up or not.
#
# You don't have to wait for one load job to complete before issuing
# the next one, because Neptune can queue up as many as 64 jobs at a
# time, provided that their `queueRequest` parameters are all set to
- # `"TRUE"`.
+ # `"TRUE"`. The queue order of the jobs will be first-in-first-out
+ # (FIFO).
#
# If the `queueRequest` parameter is omitted or set to `"FALSE"`, the
# load request will fail if another load job is already running.
#
# *Allowed values*: `"TRUE"`, `"FALSE"`.
@@ -3331,10 +3332,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-neptunedata'
- context[:gem_version] = '1.4.0'
+ context[:gem_version] = '1.5.0'
Seahorse::Client::Request.new(handlers, context)
end
# @api private
# @deprecated