aws-sdk-transcribeservice 1.124.0 → 1.126.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5cae5d515736ab383d4e0dee2c490487aacf988081b77bedf30ed512d8d8fccd
4
- data.tar.gz: e7addf52cba57222375747310aba393a738b04bc2d7a889b54995f2ddaff0b70
3
+ metadata.gz: 84d5d756a1ab931c0b9ef8a7851da141fd7e98c5f722622ba6feb0115db5f286
4
+ data.tar.gz: 12bc05abe3d48cc4a5571f93426d30915cca5414787782dbe592a9da0555f39f
5
5
  SHA512:
6
- metadata.gz: 2632671f18acf81ff094ef89bce2a57f45cbefc44ffc93704b13c9625e39a089bc9cdde5e5a37ab9099d07f9ee7977cf4187c7ba15146d352adf78bb9646fe0f
7
- data.tar.gz: 1e978a2e0447242e52ad98ceb6397ed0eda3e8d999a45094a622428dbb074c13b572c5d8625f7ab4ff38a8166261ffea1f39a4d742e3904a30e8e5d89ba0f538
6
+ metadata.gz: 5f194b2d8583540bd52b87da48c463e3972ee5244c0990c2549df201085935686c3223e319acc32cfd80e928726af95a1d5ef5aa975aeb3c884ad971d87b5712
7
+ data.tar.gz: 391e48ff84fa65bff7f14646e5d25114998a19e08b23fb3daed0103b7b4f2df0f00d91a916f3aeed6af785862c622f222c33634e0bb7dbad1eb346fe66bd6795
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.126.0 (2025-08-08)
5
+ ------------------
6
+
7
+ * Feature - Update documentation to use key ARN only in OutputEncryptionKMSKeyId request parameter
8
+
9
+ 1.125.0 (2025-08-04)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.124.0 (2025-07-31)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.124.0
1
+ 1.126.0
@@ -95,8 +95,8 @@ module Aws::TranscribeService
95
95
  # class name or an instance of a plugin class.
96
96
  #
97
97
  # @option options [required, Aws::CredentialProvider] :credentials
98
- # Your AWS credentials used for authentication. This can be an instance of any one of the
99
- # following classes:
98
+ # Your AWS credentials used for authentication. This can be any class that includes and implements
99
+ # `Aws::CredentialProvider`, or instance of any one of the following classes:
100
100
  #
101
101
  # * `Aws::Credentials` - Used for configuring static, non-refreshing
102
102
  # credentials.
@@ -124,8 +124,7 @@ module Aws::TranscribeService
124
124
  # * `Aws::CognitoIdentityCredentials` - Used for loading credentials
125
125
  # from the Cognito Identity service.
126
126
  #
127
- # When `:credentials` are not configured directly, the following
128
- # locations will be searched for credentials:
127
+ # When `:credentials` are not configured directly, the following locations will be searched for credentials:
129
128
  #
130
129
  # * `Aws.config[:credentials]`
131
130
  #
@@ -139,12 +138,10 @@ module Aws::TranscribeService
139
138
  #
140
139
  # * `~/.aws/config`
141
140
  #
142
- # * EC2/ECS IMDS instance profile - When used by default, the timeouts
143
- # are very aggressive. Construct and pass an instance of
144
- # `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
145
- # enable retries and extended timeouts. Instance profile credential
146
- # fetching can be disabled by setting `ENV['AWS_EC2_METADATA_DISABLED']`
147
- # to `true`.
141
+ # * EC2/ECS IMDS instance profile - When used by default, the timeouts are very aggressive.
142
+ # Construct and pass an instance of `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
143
+ # enable retries and extended timeouts. Instance profile credential fetching can be disabled by
144
+ # setting `ENV['AWS_EC2_METADATA_DISABLED']` to `true`.
148
145
  #
149
146
  # @option options [required, String] :region
150
147
  # The AWS region to connect to. The configured `:region` is
@@ -384,8 +381,8 @@ module Aws::TranscribeService
384
381
  # `Aws::Telemetry::OTelProvider` for telemetry provider.
385
382
  #
386
383
  # @option options [Aws::TokenProvider] :token_provider
387
- # Your Bearer token used for authentication. This can be an instance of any one of the
388
- # following classes:
384
+ # Your Bearer token used for authentication. This can be any class that includes and implements
385
+ # `Aws::TokenProvider`, or instance of any one of the following classes:
389
386
  #
390
387
  # * `Aws::StaticTokenProvider` - Used for configuring static, non-refreshing
391
388
  # tokens.
@@ -2792,42 +2789,24 @@ module Aws::TranscribeService
2792
2789
  # access your transcript.
2793
2790
  #
2794
2791
  # @option params [String] :output_encryption_kms_key_id
2795
- # The KMS key you want to use to encrypt your Call Analytics output.
2792
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
2793
+ # encrypt your Call Analytics output.
2796
2794
  #
2797
- # If using a key located in the **current** Amazon Web Services account,
2798
- # you can specify your KMS key in one of four ways:
2799
- #
2800
- # 1. Use the KMS key ID itself. For example,
2801
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
2802
- #
2803
- # 2. Use an alias for the KMS key ID. For example,
2804
- # `alias/ExampleAlias`.
2805
- #
2806
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
2807
- # example,
2808
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
2809
- #
2810
- # 4. Use the ARN for the KMS key alias. For example,
2811
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
2812
- #
2813
- # If using a key located in a **different** Amazon Web Services account
2814
- # than the current Amazon Web Services account, you can specify your KMS
2815
- # key in one of two ways:
2816
- #
2817
- # 1. Use the ARN for the KMS key ID. For example,
2818
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
2819
- #
2820
- # 2. Use the ARN for the KMS key alias. For example,
2821
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
2795
+ # KMS key ARNs have the format
2796
+ # `arn:partition:kms:region:account:key/key-id`. For example:
2797
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
2798
+ # For more information, see [ KMS key ARNs][1].
2822
2799
  #
2823
2800
  # If you do not specify an encryption key, your output is encrypted with
2824
2801
  # the default Amazon S3 key (SSE-S3).
2825
2802
  #
2826
- # If you specify a KMS key to encrypt your output, you must also specify
2827
- # an output location using the `OutputLocation` parameter.
2803
+ # Note that the role making the request and the role specified in the
2804
+ # `DataAccessRoleArn` request parameter (if present) must have
2805
+ # permission to use the specified KMS key.
2806
+ #
2807
+ #
2828
2808
  #
2829
- # Note that the role making the request must have permission to use the
2830
- # specified KMS key.
2809
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
2831
2810
  #
2832
2811
  # @option params [String] :data_access_role_arn
2833
2812
  # The Amazon Resource Name (ARN) of an IAM role that has permissions to
@@ -3052,39 +3031,24 @@ module Aws::TranscribeService
3052
3031
  # [2]: https://docs.aws.amazon.com/transcribe/latest/dg/security_iam_id-based-policy-examples.html#auth-role-iam-user
3053
3032
  #
3054
3033
  # @option params [String] :output_encryption_kms_key_id
3055
- # The KMS key you want to use to encrypt your Medical Scribe output.
3034
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
3035
+ # encrypt your Medical Scribe output.
3056
3036
  #
3057
- # If using a key located in the **current** Amazon Web Services account,
3058
- # you can specify your KMS key in one of four ways:
3037
+ # KMS key ARNs have the format
3038
+ # `arn:partition:kms:region:account:key/key-id`. For example:
3039
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3040
+ # For more information, see [ KMS key ARNs][1].
3059
3041
  #
3060
- # 1. Use the KMS key ID itself. For example,
3061
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
3062
- #
3063
- # 2. Use an alias for the KMS key ID. For example,
3064
- # `alias/ExampleAlias`.
3065
- #
3066
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
3067
- # example,
3068
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3069
- #
3070
- # 4. Use the ARN for the KMS key alias. For example,
3071
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3072
- #
3073
- # If using a key located in a **different** Amazon Web Services account
3074
- # than the current Amazon Web Services account, you can specify your KMS
3075
- # key in one of two ways:
3042
+ # If you do not specify an encryption key, your output is encrypted with
3043
+ # the default Amazon S3 key (SSE-S3).
3076
3044
  #
3077
- # 1. Use the ARN for the KMS key ID. For example,
3078
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3045
+ # Note that the role making the request and the role specified in the
3046
+ # `DataAccessRoleArn` request parameter (if present) must have
3047
+ # permission to use the specified KMS key.
3079
3048
  #
3080
- # 2. Use the ARN for the KMS key alias. For example,
3081
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3082
3049
  #
3083
- # If you do not specify an encryption key, your output is encrypted with
3084
- # the default Amazon S3 key (SSE-S3).
3085
3050
  #
3086
- # Note that the role specified in the `DataAccessRoleArn` request
3087
- # parameter must have permission to use the specified KMS key.
3051
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
3088
3052
  #
3089
3053
  # @option params [Hash<String,String>] :kms_encryption_context
3090
3054
  # A map of plain text, non-secret key:value pairs, known as encryption
@@ -3373,43 +3337,24 @@ module Aws::TranscribeService
3373
3337
  # doesn't exist, one is created for you.
3374
3338
  #
3375
3339
  # @option params [String] :output_encryption_kms_key_id
3376
- # The KMS key you want to use to encrypt your medical transcription
3377
- # output.
3340
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
3341
+ # encrypt your medical transcription output.
3378
3342
  #
3379
- # If using a key located in the **current** Amazon Web Services account,
3380
- # you can specify your KMS key in one of four ways:
3381
- #
3382
- # 1. Use the KMS key ID itself. For example,
3383
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
3384
- #
3385
- # 2. Use an alias for the KMS key ID. For example,
3386
- # `alias/ExampleAlias`.
3387
- #
3388
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
3389
- # example,
3390
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3391
- #
3392
- # 4. Use the ARN for the KMS key alias. For example,
3393
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3394
- #
3395
- # If using a key located in a **different** Amazon Web Services account
3396
- # than the current Amazon Web Services account, you can specify your KMS
3397
- # key in one of two ways:
3398
- #
3399
- # 1. Use the ARN for the KMS key ID. For example,
3400
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3401
- #
3402
- # 2. Use the ARN for the KMS key alias. For example,
3403
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3343
+ # KMS key ARNs have the format
3344
+ # `arn:partition:kms:region:account:key/key-id`. For example:
3345
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3346
+ # For more information, see [ KMS key ARNs][1].
3404
3347
  #
3405
3348
  # If you do not specify an encryption key, your output is encrypted with
3406
3349
  # the default Amazon S3 key (SSE-S3).
3407
3350
  #
3408
- # If you specify a KMS key to encrypt your output, you must also specify
3409
- # an output location using the `OutputLocation` parameter.
3351
+ # Note that the role making the request and the role specified in the
3352
+ # `DataAccessRoleArn` request parameter (if present) must have
3353
+ # permission to use the specified KMS key.
3354
+ #
3355
+ #
3410
3356
  #
3411
- # Note that the role making the request must have permission to use the
3412
- # specified KMS key.
3357
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
3413
3358
  #
3414
3359
  # @option params [Hash<String,String>] :kms_encryption_context
3415
3360
  # A map of plain text, non-secret key:value pairs, known as encryption
@@ -3692,42 +3637,24 @@ module Aws::TranscribeService
3692
3637
  # doesn't exist, one is created for you.
3693
3638
  #
3694
3639
  # @option params [String] :output_encryption_kms_key_id
3695
- # The KMS key you want to use to encrypt your transcription output.
3640
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
3641
+ # encrypt your transcription output.
3696
3642
  #
3697
- # If using a key located in the **current** Amazon Web Services account,
3698
- # you can specify your KMS key in one of four ways:
3699
- #
3700
- # 1. Use the KMS key ID itself. For example,
3701
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
3702
- #
3703
- # 2. Use an alias for the KMS key ID. For example,
3704
- # `alias/ExampleAlias`.
3705
- #
3706
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
3707
- # example,
3708
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3709
- #
3710
- # 4. Use the ARN for the KMS key alias. For example,
3711
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3712
- #
3713
- # If using a key located in a **different** Amazon Web Services account
3714
- # than the current Amazon Web Services account, you can specify your KMS
3715
- # key in one of two ways:
3716
- #
3717
- # 1. Use the ARN for the KMS key ID. For example,
3718
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3719
- #
3720
- # 2. Use the ARN for the KMS key alias. For example,
3721
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3643
+ # KMS key ARNs have the format
3644
+ # `arn:partition:kms:region:account:key/key-id`. For example:
3645
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3646
+ # For more information, see [ KMS key ARNs][1].
3722
3647
  #
3723
3648
  # If you do not specify an encryption key, your output is encrypted with
3724
3649
  # the default Amazon S3 key (SSE-S3).
3725
3650
  #
3726
- # If you specify a KMS key to encrypt your output, you must also specify
3727
- # an output location using the `OutputLocation` parameter.
3651
+ # Note that the role making the request and the role specified in the
3652
+ # `DataAccessRoleArn` request parameter (if present) must have
3653
+ # permission to use the specified KMS key.
3654
+ #
3655
+ #
3728
3656
  #
3729
- # Note that the role making the request must have permission to use the
3730
- # specified KMS key.
3657
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
3731
3658
  #
3732
3659
  # @option params [Hash<String,String>] :kms_encryption_context
3733
3660
  # A map of plain text, non-secret key:value pairs, known as encryption
@@ -4575,7 +4502,7 @@ module Aws::TranscribeService
4575
4502
  tracer: tracer
4576
4503
  )
4577
4504
  context[:gem_name] = 'aws-sdk-transcribeservice'
4578
- context[:gem_version] = '1.124.0'
4505
+ context[:gem_version] = '1.126.0'
4579
4506
  Seahorse::Client::Request.new(handlers, context)
4580
4507
  end
4581
4508
 
@@ -4022,42 +4022,24 @@ module Aws::TranscribeService
4022
4022
  # @return [String]
4023
4023
  #
4024
4024
  # @!attribute [rw] output_encryption_kms_key_id
4025
- # The KMS key you want to use to encrypt your Call Analytics output.
4025
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4026
+ # encrypt your Call Analytics output.
4026
4027
  #
4027
- # If using a key located in the **current** Amazon Web Services
4028
- # account, you can specify your KMS key in one of four ways:
4029
- #
4030
- # 1. Use the KMS key ID itself. For example,
4031
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4032
- #
4033
- # 2. Use an alias for the KMS key ID. For example,
4034
- # `alias/ExampleAlias`.
4035
- #
4036
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4037
- # example,
4038
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4039
- #
4040
- # 4. Use the ARN for the KMS key alias. For example,
4041
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4042
- #
4043
- # If using a key located in a **different** Amazon Web Services
4044
- # account than the current Amazon Web Services account, you can
4045
- # specify your KMS key in one of two ways:
4046
- #
4047
- # 1. Use the ARN for the KMS key ID. For example,
4048
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4049
- #
4050
- # 2. Use the ARN for the KMS key alias. For example,
4051
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4028
+ # KMS key ARNs have the format
4029
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4030
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4031
+ # For more information, see [ KMS key ARNs][1].
4052
4032
  #
4053
4033
  # If you do not specify an encryption key, your output is encrypted
4054
4034
  # with the default Amazon S3 key (SSE-S3).
4055
4035
  #
4056
- # If you specify a KMS key to encrypt your output, you must also
4057
- # specify an output location using the `OutputLocation` parameter.
4036
+ # Note that the role making the request and the role specified in the
4037
+ # `DataAccessRoleArn` request parameter (if present) must have
4038
+ # permission to use the specified KMS key.
4039
+ #
4040
+ #
4058
4041
  #
4059
- # Note that the role making the request must have permission to use
4060
- # the specified KMS key.
4042
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4061
4043
  # @return [String]
4062
4044
  #
4063
4045
  # @!attribute [rw] data_access_role_arn
@@ -4172,39 +4154,24 @@ module Aws::TranscribeService
4172
4154
  # @return [String]
4173
4155
  #
4174
4156
  # @!attribute [rw] output_encryption_kms_key_id
4175
- # The KMS key you want to use to encrypt your Medical Scribe output.
4157
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4158
+ # encrypt your Medical Scribe output.
4176
4159
  #
4177
- # If using a key located in the **current** Amazon Web Services
4178
- # account, you can specify your KMS key in one of four ways:
4160
+ # KMS key ARNs have the format
4161
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4162
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4163
+ # For more information, see [ KMS key ARNs][1].
4179
4164
  #
4180
- # 1. Use the KMS key ID itself. For example,
4181
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4182
- #
4183
- # 2. Use an alias for the KMS key ID. For example,
4184
- # `alias/ExampleAlias`.
4185
- #
4186
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4187
- # example,
4188
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4189
- #
4190
- # 4. Use the ARN for the KMS key alias. For example,
4191
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4192
- #
4193
- # If using a key located in a **different** Amazon Web Services
4194
- # account than the current Amazon Web Services account, you can
4195
- # specify your KMS key in one of two ways:
4165
+ # If you do not specify an encryption key, your output is encrypted
4166
+ # with the default Amazon S3 key (SSE-S3).
4196
4167
  #
4197
- # 1. Use the ARN for the KMS key ID. For example,
4198
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4168
+ # Note that the role making the request and the role specified in the
4169
+ # `DataAccessRoleArn` request parameter (if present) must have
4170
+ # permission to use the specified KMS key.
4199
4171
  #
4200
- # 2. Use the ARN for the KMS key alias. For example,
4201
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4202
4172
  #
4203
- # If you do not specify an encryption key, your output is encrypted
4204
- # with the default Amazon S3 key (SSE-S3).
4205
4173
  #
4206
- # Note that the role specified in the `DataAccessRoleArn` request
4207
- # parameter must have permission to use the specified KMS key.
4174
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4208
4175
  # @return [String]
4209
4176
  #
4210
4177
  # @!attribute [rw] kms_encryption_context
@@ -4414,43 +4381,24 @@ module Aws::TranscribeService
4414
4381
  # @return [String]
4415
4382
  #
4416
4383
  # @!attribute [rw] output_encryption_kms_key_id
4417
- # The KMS key you want to use to encrypt your medical transcription
4418
- # output.
4384
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4385
+ # encrypt your medical transcription output.
4419
4386
  #
4420
- # If using a key located in the **current** Amazon Web Services
4421
- # account, you can specify your KMS key in one of four ways:
4422
- #
4423
- # 1. Use the KMS key ID itself. For example,
4424
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4425
- #
4426
- # 2. Use an alias for the KMS key ID. For example,
4427
- # `alias/ExampleAlias`.
4428
- #
4429
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4430
- # example,
4431
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4432
- #
4433
- # 4. Use the ARN for the KMS key alias. For example,
4434
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4435
- #
4436
- # If using a key located in a **different** Amazon Web Services
4437
- # account than the current Amazon Web Services account, you can
4438
- # specify your KMS key in one of two ways:
4439
- #
4440
- # 1. Use the ARN for the KMS key ID. For example,
4441
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4442
- #
4443
- # 2. Use the ARN for the KMS key alias. For example,
4444
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4387
+ # KMS key ARNs have the format
4388
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4389
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4390
+ # For more information, see [ KMS key ARNs][1].
4445
4391
  #
4446
4392
  # If you do not specify an encryption key, your output is encrypted
4447
4393
  # with the default Amazon S3 key (SSE-S3).
4448
4394
  #
4449
- # If you specify a KMS key to encrypt your output, you must also
4450
- # specify an output location using the `OutputLocation` parameter.
4395
+ # Note that the role making the request and the role specified in the
4396
+ # `DataAccessRoleArn` request parameter (if present) must have
4397
+ # permission to use the specified KMS key.
4398
+ #
4399
+ #
4451
4400
  #
4452
- # Note that the role making the request must have permission to use
4453
- # the specified KMS key.
4401
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4454
4402
  # @return [String]
4455
4403
  #
4456
4404
  # @!attribute [rw] kms_encryption_context
@@ -4674,42 +4622,24 @@ module Aws::TranscribeService
4674
4622
  # @return [String]
4675
4623
  #
4676
4624
  # @!attribute [rw] output_encryption_kms_key_id
4677
- # The KMS key you want to use to encrypt your transcription output.
4625
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4626
+ # encrypt your transcription output.
4678
4627
  #
4679
- # If using a key located in the **current** Amazon Web Services
4680
- # account, you can specify your KMS key in one of four ways:
4681
- #
4682
- # 1. Use the KMS key ID itself. For example,
4683
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4684
- #
4685
- # 2. Use an alias for the KMS key ID. For example,
4686
- # `alias/ExampleAlias`.
4687
- #
4688
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4689
- # example,
4690
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4691
- #
4692
- # 4. Use the ARN for the KMS key alias. For example,
4693
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4694
- #
4695
- # If using a key located in a **different** Amazon Web Services
4696
- # account than the current Amazon Web Services account, you can
4697
- # specify your KMS key in one of two ways:
4698
- #
4699
- # 1. Use the ARN for the KMS key ID. For example,
4700
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4701
- #
4702
- # 2. Use the ARN for the KMS key alias. For example,
4703
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4628
+ # KMS key ARNs have the format
4629
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4630
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4631
+ # For more information, see [ KMS key ARNs][1].
4704
4632
  #
4705
4633
  # If you do not specify an encryption key, your output is encrypted
4706
4634
  # with the default Amazon S3 key (SSE-S3).
4707
4635
  #
4708
- # If you specify a KMS key to encrypt your output, you must also
4709
- # specify an output location using the `OutputLocation` parameter.
4636
+ # Note that the role making the request and the role specified in the
4637
+ # `DataAccessRoleArn` request parameter (if present) must have
4638
+ # permission to use the specified KMS key.
4639
+ #
4640
+ #
4710
4641
  #
4711
- # Note that the role making the request must have permission to use
4712
- # the specified KMS key.
4642
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4713
4643
  # @return [String]
4714
4644
  #
4715
4645
  # @!attribute [rw] kms_encryption_context
@@ -54,7 +54,7 @@ module Aws::TranscribeService
54
54
  autoload :EndpointProvider, 'aws-sdk-transcribeservice/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-transcribeservice/endpoints'
56
56
 
57
- GEM_VERSION = '1.124.0'
57
+ GEM_VERSION = '1.126.0'
58
58
 
59
59
  end
60
60
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-transcribeservice
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.124.0
4
+ version: 1.126.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services