aws-sdk-transcribeservice 1.124.0 → 1.126.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-transcribeservice/client.rb +58 -131
- data/lib/aws-sdk-transcribeservice/types.rb +48 -118
- data/lib/aws-sdk-transcribeservice.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 84d5d756a1ab931c0b9ef8a7851da141fd7e98c5f722622ba6feb0115db5f286
|
4
|
+
data.tar.gz: 12bc05abe3d48cc4a5571f93426d30915cca5414787782dbe592a9da0555f39f
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 5f194b2d8583540bd52b87da48c463e3972ee5244c0990c2549df201085935686c3223e319acc32cfd80e928726af95a1d5ef5aa975aeb3c884ad971d87b5712
|
7
|
+
data.tar.gz: 391e48ff84fa65bff7f14646e5d25114998a19e08b23fb3daed0103b7b4f2df0f00d91a916f3aeed6af785862c622f222c33634e0bb7dbad1eb346fe66bd6795
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.126.0 (2025-08-08)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Update documentation to use key ARN only in OutputEncryptionKMSKeyId request parameter
|
8
|
+
|
9
|
+
1.125.0 (2025-08-04)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.124.0 (2025-07-31)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.126.0
|
@@ -95,8 +95,8 @@ module Aws::TranscribeService
|
|
95
95
|
# class name or an instance of a plugin class.
|
96
96
|
#
|
97
97
|
# @option options [required, Aws::CredentialProvider] :credentials
|
98
|
-
# Your AWS credentials used for authentication. This can be
|
99
|
-
# following classes:
|
98
|
+
# Your AWS credentials used for authentication. This can be any class that includes and implements
|
99
|
+
# `Aws::CredentialProvider`, or instance of any one of the following classes:
|
100
100
|
#
|
101
101
|
# * `Aws::Credentials` - Used for configuring static, non-refreshing
|
102
102
|
# credentials.
|
@@ -124,8 +124,7 @@ module Aws::TranscribeService
|
|
124
124
|
# * `Aws::CognitoIdentityCredentials` - Used for loading credentials
|
125
125
|
# from the Cognito Identity service.
|
126
126
|
#
|
127
|
-
# When `:credentials` are not configured directly, the following
|
128
|
-
# locations will be searched for credentials:
|
127
|
+
# When `:credentials` are not configured directly, the following locations will be searched for credentials:
|
129
128
|
#
|
130
129
|
# * `Aws.config[:credentials]`
|
131
130
|
#
|
@@ -139,12 +138,10 @@ module Aws::TranscribeService
|
|
139
138
|
#
|
140
139
|
# * `~/.aws/config`
|
141
140
|
#
|
142
|
-
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
143
|
-
#
|
144
|
-
#
|
145
|
-
#
|
146
|
-
# fetching can be disabled by setting `ENV['AWS_EC2_METADATA_DISABLED']`
|
147
|
-
# to `true`.
|
141
|
+
# * EC2/ECS IMDS instance profile - When used by default, the timeouts are very aggressive.
|
142
|
+
# Construct and pass an instance of `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
|
143
|
+
# enable retries and extended timeouts. Instance profile credential fetching can be disabled by
|
144
|
+
# setting `ENV['AWS_EC2_METADATA_DISABLED']` to `true`.
|
148
145
|
#
|
149
146
|
# @option options [required, String] :region
|
150
147
|
# The AWS region to connect to. The configured `:region` is
|
@@ -384,8 +381,8 @@ module Aws::TranscribeService
|
|
384
381
|
# `Aws::Telemetry::OTelProvider` for telemetry provider.
|
385
382
|
#
|
386
383
|
# @option options [Aws::TokenProvider] :token_provider
|
387
|
-
# Your Bearer token used for authentication. This can be
|
388
|
-
# following classes:
|
384
|
+
# Your Bearer token used for authentication. This can be any class that includes and implements
|
385
|
+
# `Aws::TokenProvider`, or instance of any one of the following classes:
|
389
386
|
#
|
390
387
|
# * `Aws::StaticTokenProvider` - Used for configuring static, non-refreshing
|
391
388
|
# tokens.
|
@@ -2792,42 +2789,24 @@ module Aws::TranscribeService
|
|
2792
2789
|
# access your transcript.
|
2793
2790
|
#
|
2794
2791
|
# @option params [String] :output_encryption_kms_key_id
|
2795
|
-
# The KMS key you want to use to
|
2792
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
2793
|
+
# encrypt your Call Analytics output.
|
2796
2794
|
#
|
2797
|
-
#
|
2798
|
-
#
|
2799
|
-
#
|
2800
|
-
#
|
2801
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2802
|
-
#
|
2803
|
-
# 2. Use an alias for the KMS key ID. For example,
|
2804
|
-
# `alias/ExampleAlias`.
|
2805
|
-
#
|
2806
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
2807
|
-
# example,
|
2808
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2809
|
-
#
|
2810
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
2811
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
2812
|
-
#
|
2813
|
-
# If using a key located in a **different** Amazon Web Services account
|
2814
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
2815
|
-
# key in one of two ways:
|
2816
|
-
#
|
2817
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
2818
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2819
|
-
#
|
2820
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
2821
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
2795
|
+
# KMS key ARNs have the format
|
2796
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
2797
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2798
|
+
# For more information, see [ KMS key ARNs][1].
|
2822
2799
|
#
|
2823
2800
|
# If you do not specify an encryption key, your output is encrypted with
|
2824
2801
|
# the default Amazon S3 key (SSE-S3).
|
2825
2802
|
#
|
2826
|
-
#
|
2827
|
-
#
|
2803
|
+
# Note that the role making the request and the role specified in the
|
2804
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
2805
|
+
# permission to use the specified KMS key.
|
2806
|
+
#
|
2807
|
+
#
|
2828
2808
|
#
|
2829
|
-
#
|
2830
|
-
# specified KMS key.
|
2809
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
2831
2810
|
#
|
2832
2811
|
# @option params [String] :data_access_role_arn
|
2833
2812
|
# The Amazon Resource Name (ARN) of an IAM role that has permissions to
|
@@ -3052,39 +3031,24 @@ module Aws::TranscribeService
|
|
3052
3031
|
# [2]: https://docs.aws.amazon.com/transcribe/latest/dg/security_iam_id-based-policy-examples.html#auth-role-iam-user
|
3053
3032
|
#
|
3054
3033
|
# @option params [String] :output_encryption_kms_key_id
|
3055
|
-
# The KMS key you want to use to
|
3034
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
3035
|
+
# encrypt your Medical Scribe output.
|
3056
3036
|
#
|
3057
|
-
#
|
3058
|
-
#
|
3037
|
+
# KMS key ARNs have the format
|
3038
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
3039
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3040
|
+
# For more information, see [ KMS key ARNs][1].
|
3059
3041
|
#
|
3060
|
-
#
|
3061
|
-
#
|
3062
|
-
#
|
3063
|
-
# 2. Use an alias for the KMS key ID. For example,
|
3064
|
-
# `alias/ExampleAlias`.
|
3065
|
-
#
|
3066
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
3067
|
-
# example,
|
3068
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3069
|
-
#
|
3070
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
3071
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3072
|
-
#
|
3073
|
-
# If using a key located in a **different** Amazon Web Services account
|
3074
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
3075
|
-
# key in one of two ways:
|
3042
|
+
# If you do not specify an encryption key, your output is encrypted with
|
3043
|
+
# the default Amazon S3 key (SSE-S3).
|
3076
3044
|
#
|
3077
|
-
#
|
3078
|
-
#
|
3045
|
+
# Note that the role making the request and the role specified in the
|
3046
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
3047
|
+
# permission to use the specified KMS key.
|
3079
3048
|
#
|
3080
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
3081
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3082
3049
|
#
|
3083
|
-
# If you do not specify an encryption key, your output is encrypted with
|
3084
|
-
# the default Amazon S3 key (SSE-S3).
|
3085
3050
|
#
|
3086
|
-
#
|
3087
|
-
# parameter must have permission to use the specified KMS key.
|
3051
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
3088
3052
|
#
|
3089
3053
|
# @option params [Hash<String,String>] :kms_encryption_context
|
3090
3054
|
# A map of plain text, non-secret key:value pairs, known as encryption
|
@@ -3373,43 +3337,24 @@ module Aws::TranscribeService
|
|
3373
3337
|
# doesn't exist, one is created for you.
|
3374
3338
|
#
|
3375
3339
|
# @option params [String] :output_encryption_kms_key_id
|
3376
|
-
# The KMS key you want to use to
|
3377
|
-
# output.
|
3340
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
3341
|
+
# encrypt your medical transcription output.
|
3378
3342
|
#
|
3379
|
-
#
|
3380
|
-
#
|
3381
|
-
#
|
3382
|
-
#
|
3383
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3384
|
-
#
|
3385
|
-
# 2. Use an alias for the KMS key ID. For example,
|
3386
|
-
# `alias/ExampleAlias`.
|
3387
|
-
#
|
3388
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
3389
|
-
# example,
|
3390
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3391
|
-
#
|
3392
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
3393
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3394
|
-
#
|
3395
|
-
# If using a key located in a **different** Amazon Web Services account
|
3396
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
3397
|
-
# key in one of two ways:
|
3398
|
-
#
|
3399
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
3400
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3401
|
-
#
|
3402
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
3403
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3343
|
+
# KMS key ARNs have the format
|
3344
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
3345
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3346
|
+
# For more information, see [ KMS key ARNs][1].
|
3404
3347
|
#
|
3405
3348
|
# If you do not specify an encryption key, your output is encrypted with
|
3406
3349
|
# the default Amazon S3 key (SSE-S3).
|
3407
3350
|
#
|
3408
|
-
#
|
3409
|
-
#
|
3351
|
+
# Note that the role making the request and the role specified in the
|
3352
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
3353
|
+
# permission to use the specified KMS key.
|
3354
|
+
#
|
3355
|
+
#
|
3410
3356
|
#
|
3411
|
-
#
|
3412
|
-
# specified KMS key.
|
3357
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
3413
3358
|
#
|
3414
3359
|
# @option params [Hash<String,String>] :kms_encryption_context
|
3415
3360
|
# A map of plain text, non-secret key:value pairs, known as encryption
|
@@ -3692,42 +3637,24 @@ module Aws::TranscribeService
|
|
3692
3637
|
# doesn't exist, one is created for you.
|
3693
3638
|
#
|
3694
3639
|
# @option params [String] :output_encryption_kms_key_id
|
3695
|
-
# The KMS key you want to use to
|
3640
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
3641
|
+
# encrypt your transcription output.
|
3696
3642
|
#
|
3697
|
-
#
|
3698
|
-
#
|
3699
|
-
#
|
3700
|
-
#
|
3701
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3702
|
-
#
|
3703
|
-
# 2. Use an alias for the KMS key ID. For example,
|
3704
|
-
# `alias/ExampleAlias`.
|
3705
|
-
#
|
3706
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
3707
|
-
# example,
|
3708
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3709
|
-
#
|
3710
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
3711
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3712
|
-
#
|
3713
|
-
# If using a key located in a **different** Amazon Web Services account
|
3714
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
3715
|
-
# key in one of two ways:
|
3716
|
-
#
|
3717
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
3718
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3719
|
-
#
|
3720
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
3721
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3643
|
+
# KMS key ARNs have the format
|
3644
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
3645
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3646
|
+
# For more information, see [ KMS key ARNs][1].
|
3722
3647
|
#
|
3723
3648
|
# If you do not specify an encryption key, your output is encrypted with
|
3724
3649
|
# the default Amazon S3 key (SSE-S3).
|
3725
3650
|
#
|
3726
|
-
#
|
3727
|
-
#
|
3651
|
+
# Note that the role making the request and the role specified in the
|
3652
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
3653
|
+
# permission to use the specified KMS key.
|
3654
|
+
#
|
3655
|
+
#
|
3728
3656
|
#
|
3729
|
-
#
|
3730
|
-
# specified KMS key.
|
3657
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
3731
3658
|
#
|
3732
3659
|
# @option params [Hash<String,String>] :kms_encryption_context
|
3733
3660
|
# A map of plain text, non-secret key:value pairs, known as encryption
|
@@ -4575,7 +4502,7 @@ module Aws::TranscribeService
|
|
4575
4502
|
tracer: tracer
|
4576
4503
|
)
|
4577
4504
|
context[:gem_name] = 'aws-sdk-transcribeservice'
|
4578
|
-
context[:gem_version] = '1.
|
4505
|
+
context[:gem_version] = '1.126.0'
|
4579
4506
|
Seahorse::Client::Request.new(handlers, context)
|
4580
4507
|
end
|
4581
4508
|
|
@@ -4022,42 +4022,24 @@ module Aws::TranscribeService
|
|
4022
4022
|
# @return [String]
|
4023
4023
|
#
|
4024
4024
|
# @!attribute [rw] output_encryption_kms_key_id
|
4025
|
-
# The KMS key you want to use to
|
4025
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4026
|
+
# encrypt your Call Analytics output.
|
4026
4027
|
#
|
4027
|
-
#
|
4028
|
-
# account
|
4029
|
-
#
|
4030
|
-
#
|
4031
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4032
|
-
#
|
4033
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4034
|
-
# `alias/ExampleAlias`.
|
4035
|
-
#
|
4036
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4037
|
-
# example,
|
4038
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4039
|
-
#
|
4040
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4041
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4042
|
-
#
|
4043
|
-
# If using a key located in a **different** Amazon Web Services
|
4044
|
-
# account than the current Amazon Web Services account, you can
|
4045
|
-
# specify your KMS key in one of two ways:
|
4046
|
-
#
|
4047
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
4048
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4049
|
-
#
|
4050
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4051
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4028
|
+
# KMS key ARNs have the format
|
4029
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4030
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4031
|
+
# For more information, see [ KMS key ARNs][1].
|
4052
4032
|
#
|
4053
4033
|
# If you do not specify an encryption key, your output is encrypted
|
4054
4034
|
# with the default Amazon S3 key (SSE-S3).
|
4055
4035
|
#
|
4056
|
-
#
|
4057
|
-
#
|
4036
|
+
# Note that the role making the request and the role specified in the
|
4037
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4038
|
+
# permission to use the specified KMS key.
|
4039
|
+
#
|
4040
|
+
#
|
4058
4041
|
#
|
4059
|
-
#
|
4060
|
-
# the specified KMS key.
|
4042
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4061
4043
|
# @return [String]
|
4062
4044
|
#
|
4063
4045
|
# @!attribute [rw] data_access_role_arn
|
@@ -4172,39 +4154,24 @@ module Aws::TranscribeService
|
|
4172
4154
|
# @return [String]
|
4173
4155
|
#
|
4174
4156
|
# @!attribute [rw] output_encryption_kms_key_id
|
4175
|
-
# The KMS key you want to use to
|
4157
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4158
|
+
# encrypt your Medical Scribe output.
|
4176
4159
|
#
|
4177
|
-
#
|
4178
|
-
# account
|
4160
|
+
# KMS key ARNs have the format
|
4161
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4162
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4163
|
+
# For more information, see [ KMS key ARNs][1].
|
4179
4164
|
#
|
4180
|
-
#
|
4181
|
-
#
|
4182
|
-
#
|
4183
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4184
|
-
# `alias/ExampleAlias`.
|
4185
|
-
#
|
4186
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4187
|
-
# example,
|
4188
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4189
|
-
#
|
4190
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4191
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4192
|
-
#
|
4193
|
-
# If using a key located in a **different** Amazon Web Services
|
4194
|
-
# account than the current Amazon Web Services account, you can
|
4195
|
-
# specify your KMS key in one of two ways:
|
4165
|
+
# If you do not specify an encryption key, your output is encrypted
|
4166
|
+
# with the default Amazon S3 key (SSE-S3).
|
4196
4167
|
#
|
4197
|
-
#
|
4198
|
-
#
|
4168
|
+
# Note that the role making the request and the role specified in the
|
4169
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4170
|
+
# permission to use the specified KMS key.
|
4199
4171
|
#
|
4200
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4201
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4202
4172
|
#
|
4203
|
-
# If you do not specify an encryption key, your output is encrypted
|
4204
|
-
# with the default Amazon S3 key (SSE-S3).
|
4205
4173
|
#
|
4206
|
-
#
|
4207
|
-
# parameter must have permission to use the specified KMS key.
|
4174
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4208
4175
|
# @return [String]
|
4209
4176
|
#
|
4210
4177
|
# @!attribute [rw] kms_encryption_context
|
@@ -4414,43 +4381,24 @@ module Aws::TranscribeService
|
|
4414
4381
|
# @return [String]
|
4415
4382
|
#
|
4416
4383
|
# @!attribute [rw] output_encryption_kms_key_id
|
4417
|
-
# The KMS key you want to use to
|
4418
|
-
# output.
|
4384
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4385
|
+
# encrypt your medical transcription output.
|
4419
4386
|
#
|
4420
|
-
#
|
4421
|
-
# account
|
4422
|
-
#
|
4423
|
-
#
|
4424
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4425
|
-
#
|
4426
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4427
|
-
# `alias/ExampleAlias`.
|
4428
|
-
#
|
4429
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4430
|
-
# example,
|
4431
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4432
|
-
#
|
4433
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4434
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4435
|
-
#
|
4436
|
-
# If using a key located in a **different** Amazon Web Services
|
4437
|
-
# account than the current Amazon Web Services account, you can
|
4438
|
-
# specify your KMS key in one of two ways:
|
4439
|
-
#
|
4440
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
4441
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4442
|
-
#
|
4443
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4444
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4387
|
+
# KMS key ARNs have the format
|
4388
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4389
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4390
|
+
# For more information, see [ KMS key ARNs][1].
|
4445
4391
|
#
|
4446
4392
|
# If you do not specify an encryption key, your output is encrypted
|
4447
4393
|
# with the default Amazon S3 key (SSE-S3).
|
4448
4394
|
#
|
4449
|
-
#
|
4450
|
-
#
|
4395
|
+
# Note that the role making the request and the role specified in the
|
4396
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4397
|
+
# permission to use the specified KMS key.
|
4398
|
+
#
|
4399
|
+
#
|
4451
4400
|
#
|
4452
|
-
#
|
4453
|
-
# the specified KMS key.
|
4401
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4454
4402
|
# @return [String]
|
4455
4403
|
#
|
4456
4404
|
# @!attribute [rw] kms_encryption_context
|
@@ -4674,42 +4622,24 @@ module Aws::TranscribeService
|
|
4674
4622
|
# @return [String]
|
4675
4623
|
#
|
4676
4624
|
# @!attribute [rw] output_encryption_kms_key_id
|
4677
|
-
# The KMS key you want to use to
|
4625
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4626
|
+
# encrypt your transcription output.
|
4678
4627
|
#
|
4679
|
-
#
|
4680
|
-
# account
|
4681
|
-
#
|
4682
|
-
#
|
4683
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4684
|
-
#
|
4685
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4686
|
-
# `alias/ExampleAlias`.
|
4687
|
-
#
|
4688
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4689
|
-
# example,
|
4690
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4691
|
-
#
|
4692
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4693
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4694
|
-
#
|
4695
|
-
# If using a key located in a **different** Amazon Web Services
|
4696
|
-
# account than the current Amazon Web Services account, you can
|
4697
|
-
# specify your KMS key in one of two ways:
|
4698
|
-
#
|
4699
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
4700
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4701
|
-
#
|
4702
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4703
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4628
|
+
# KMS key ARNs have the format
|
4629
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4630
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4631
|
+
# For more information, see [ KMS key ARNs][1].
|
4704
4632
|
#
|
4705
4633
|
# If you do not specify an encryption key, your output is encrypted
|
4706
4634
|
# with the default Amazon S3 key (SSE-S3).
|
4707
4635
|
#
|
4708
|
-
#
|
4709
|
-
#
|
4636
|
+
# Note that the role making the request and the role specified in the
|
4637
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4638
|
+
# permission to use the specified KMS key.
|
4639
|
+
#
|
4640
|
+
#
|
4710
4641
|
#
|
4711
|
-
#
|
4712
|
-
# the specified KMS key.
|
4642
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4713
4643
|
# @return [String]
|
4714
4644
|
#
|
4715
4645
|
# @!attribute [rw] kms_encryption_context
|