aws-sdk-transcribeservice 1.125.0 → 1.126.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-transcribeservice/client.rb +49 -119
- data/lib/aws-sdk-transcribeservice/types.rb +48 -118
- data/lib/aws-sdk-transcribeservice.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 84d5d756a1ab931c0b9ef8a7851da141fd7e98c5f722622ba6feb0115db5f286
|
4
|
+
data.tar.gz: 12bc05abe3d48cc4a5571f93426d30915cca5414787782dbe592a9da0555f39f
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 5f194b2d8583540bd52b87da48c463e3972ee5244c0990c2549df201085935686c3223e319acc32cfd80e928726af95a1d5ef5aa975aeb3c884ad971d87b5712
|
7
|
+
data.tar.gz: 391e48ff84fa65bff7f14646e5d25114998a19e08b23fb3daed0103b7b4f2df0f00d91a916f3aeed6af785862c622f222c33634e0bb7dbad1eb346fe66bd6795
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.126.0
|
@@ -2789,42 +2789,24 @@ module Aws::TranscribeService
|
|
2789
2789
|
# access your transcript.
|
2790
2790
|
#
|
2791
2791
|
# @option params [String] :output_encryption_kms_key_id
|
2792
|
-
# The KMS key you want to use to
|
2792
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
2793
|
+
# encrypt your Call Analytics output.
|
2793
2794
|
#
|
2794
|
-
#
|
2795
|
-
#
|
2796
|
-
#
|
2797
|
-
#
|
2798
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2799
|
-
#
|
2800
|
-
# 2. Use an alias for the KMS key ID. For example,
|
2801
|
-
# `alias/ExampleAlias`.
|
2802
|
-
#
|
2803
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
2804
|
-
# example,
|
2805
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2806
|
-
#
|
2807
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
2808
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
2809
|
-
#
|
2810
|
-
# If using a key located in a **different** Amazon Web Services account
|
2811
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
2812
|
-
# key in one of two ways:
|
2813
|
-
#
|
2814
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
2815
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2816
|
-
#
|
2817
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
2818
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
2795
|
+
# KMS key ARNs have the format
|
2796
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
2797
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2798
|
+
# For more information, see [ KMS key ARNs][1].
|
2819
2799
|
#
|
2820
2800
|
# If you do not specify an encryption key, your output is encrypted with
|
2821
2801
|
# the default Amazon S3 key (SSE-S3).
|
2822
2802
|
#
|
2823
|
-
#
|
2824
|
-
#
|
2803
|
+
# Note that the role making the request and the role specified in the
|
2804
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
2805
|
+
# permission to use the specified KMS key.
|
2806
|
+
#
|
2807
|
+
#
|
2825
2808
|
#
|
2826
|
-
#
|
2827
|
-
# specified KMS key.
|
2809
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
2828
2810
|
#
|
2829
2811
|
# @option params [String] :data_access_role_arn
|
2830
2812
|
# The Amazon Resource Name (ARN) of an IAM role that has permissions to
|
@@ -3049,39 +3031,24 @@ module Aws::TranscribeService
|
|
3049
3031
|
# [2]: https://docs.aws.amazon.com/transcribe/latest/dg/security_iam_id-based-policy-examples.html#auth-role-iam-user
|
3050
3032
|
#
|
3051
3033
|
# @option params [String] :output_encryption_kms_key_id
|
3052
|
-
# The KMS key you want to use to
|
3034
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
3035
|
+
# encrypt your Medical Scribe output.
|
3053
3036
|
#
|
3054
|
-
#
|
3055
|
-
#
|
3037
|
+
# KMS key ARNs have the format
|
3038
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
3039
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3040
|
+
# For more information, see [ KMS key ARNs][1].
|
3056
3041
|
#
|
3057
|
-
#
|
3058
|
-
#
|
3059
|
-
#
|
3060
|
-
# 2. Use an alias for the KMS key ID. For example,
|
3061
|
-
# `alias/ExampleAlias`.
|
3062
|
-
#
|
3063
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
3064
|
-
# example,
|
3065
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3066
|
-
#
|
3067
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
3068
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3069
|
-
#
|
3070
|
-
# If using a key located in a **different** Amazon Web Services account
|
3071
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
3072
|
-
# key in one of two ways:
|
3042
|
+
# If you do not specify an encryption key, your output is encrypted with
|
3043
|
+
# the default Amazon S3 key (SSE-S3).
|
3073
3044
|
#
|
3074
|
-
#
|
3075
|
-
#
|
3045
|
+
# Note that the role making the request and the role specified in the
|
3046
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
3047
|
+
# permission to use the specified KMS key.
|
3076
3048
|
#
|
3077
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
3078
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3079
3049
|
#
|
3080
|
-
# If you do not specify an encryption key, your output is encrypted with
|
3081
|
-
# the default Amazon S3 key (SSE-S3).
|
3082
3050
|
#
|
3083
|
-
#
|
3084
|
-
# parameter must have permission to use the specified KMS key.
|
3051
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
3085
3052
|
#
|
3086
3053
|
# @option params [Hash<String,String>] :kms_encryption_context
|
3087
3054
|
# A map of plain text, non-secret key:value pairs, known as encryption
|
@@ -3370,43 +3337,24 @@ module Aws::TranscribeService
|
|
3370
3337
|
# doesn't exist, one is created for you.
|
3371
3338
|
#
|
3372
3339
|
# @option params [String] :output_encryption_kms_key_id
|
3373
|
-
# The KMS key you want to use to
|
3374
|
-
# output.
|
3340
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
3341
|
+
# encrypt your medical transcription output.
|
3375
3342
|
#
|
3376
|
-
#
|
3377
|
-
#
|
3378
|
-
#
|
3379
|
-
#
|
3380
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3381
|
-
#
|
3382
|
-
# 2. Use an alias for the KMS key ID. For example,
|
3383
|
-
# `alias/ExampleAlias`.
|
3384
|
-
#
|
3385
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
3386
|
-
# example,
|
3387
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3388
|
-
#
|
3389
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
3390
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3391
|
-
#
|
3392
|
-
# If using a key located in a **different** Amazon Web Services account
|
3393
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
3394
|
-
# key in one of two ways:
|
3395
|
-
#
|
3396
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
3397
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3398
|
-
#
|
3399
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
3400
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3343
|
+
# KMS key ARNs have the format
|
3344
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
3345
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3346
|
+
# For more information, see [ KMS key ARNs][1].
|
3401
3347
|
#
|
3402
3348
|
# If you do not specify an encryption key, your output is encrypted with
|
3403
3349
|
# the default Amazon S3 key (SSE-S3).
|
3404
3350
|
#
|
3405
|
-
#
|
3406
|
-
#
|
3351
|
+
# Note that the role making the request and the role specified in the
|
3352
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
3353
|
+
# permission to use the specified KMS key.
|
3354
|
+
#
|
3355
|
+
#
|
3407
3356
|
#
|
3408
|
-
#
|
3409
|
-
# specified KMS key.
|
3357
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
3410
3358
|
#
|
3411
3359
|
# @option params [Hash<String,String>] :kms_encryption_context
|
3412
3360
|
# A map of plain text, non-secret key:value pairs, known as encryption
|
@@ -3689,42 +3637,24 @@ module Aws::TranscribeService
|
|
3689
3637
|
# doesn't exist, one is created for you.
|
3690
3638
|
#
|
3691
3639
|
# @option params [String] :output_encryption_kms_key_id
|
3692
|
-
# The KMS key you want to use to
|
3640
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
3641
|
+
# encrypt your transcription output.
|
3693
3642
|
#
|
3694
|
-
#
|
3695
|
-
#
|
3696
|
-
#
|
3697
|
-
#
|
3698
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3699
|
-
#
|
3700
|
-
# 2. Use an alias for the KMS key ID. For example,
|
3701
|
-
# `alias/ExampleAlias`.
|
3702
|
-
#
|
3703
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
3704
|
-
# example,
|
3705
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3706
|
-
#
|
3707
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
3708
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3709
|
-
#
|
3710
|
-
# If using a key located in a **different** Amazon Web Services account
|
3711
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
3712
|
-
# key in one of two ways:
|
3713
|
-
#
|
3714
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
3715
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3716
|
-
#
|
3717
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
3718
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3643
|
+
# KMS key ARNs have the format
|
3644
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
3645
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3646
|
+
# For more information, see [ KMS key ARNs][1].
|
3719
3647
|
#
|
3720
3648
|
# If you do not specify an encryption key, your output is encrypted with
|
3721
3649
|
# the default Amazon S3 key (SSE-S3).
|
3722
3650
|
#
|
3723
|
-
#
|
3724
|
-
#
|
3651
|
+
# Note that the role making the request and the role specified in the
|
3652
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
3653
|
+
# permission to use the specified KMS key.
|
3654
|
+
#
|
3655
|
+
#
|
3725
3656
|
#
|
3726
|
-
#
|
3727
|
-
# specified KMS key.
|
3657
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
3728
3658
|
#
|
3729
3659
|
# @option params [Hash<String,String>] :kms_encryption_context
|
3730
3660
|
# A map of plain text, non-secret key:value pairs, known as encryption
|
@@ -4572,7 +4502,7 @@ module Aws::TranscribeService
|
|
4572
4502
|
tracer: tracer
|
4573
4503
|
)
|
4574
4504
|
context[:gem_name] = 'aws-sdk-transcribeservice'
|
4575
|
-
context[:gem_version] = '1.
|
4505
|
+
context[:gem_version] = '1.126.0'
|
4576
4506
|
Seahorse::Client::Request.new(handlers, context)
|
4577
4507
|
end
|
4578
4508
|
|
@@ -4022,42 +4022,24 @@ module Aws::TranscribeService
|
|
4022
4022
|
# @return [String]
|
4023
4023
|
#
|
4024
4024
|
# @!attribute [rw] output_encryption_kms_key_id
|
4025
|
-
# The KMS key you want to use to
|
4025
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4026
|
+
# encrypt your Call Analytics output.
|
4026
4027
|
#
|
4027
|
-
#
|
4028
|
-
# account
|
4029
|
-
#
|
4030
|
-
#
|
4031
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4032
|
-
#
|
4033
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4034
|
-
# `alias/ExampleAlias`.
|
4035
|
-
#
|
4036
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4037
|
-
# example,
|
4038
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4039
|
-
#
|
4040
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4041
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4042
|
-
#
|
4043
|
-
# If using a key located in a **different** Amazon Web Services
|
4044
|
-
# account than the current Amazon Web Services account, you can
|
4045
|
-
# specify your KMS key in one of two ways:
|
4046
|
-
#
|
4047
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
4048
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4049
|
-
#
|
4050
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4051
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4028
|
+
# KMS key ARNs have the format
|
4029
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4030
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4031
|
+
# For more information, see [ KMS key ARNs][1].
|
4052
4032
|
#
|
4053
4033
|
# If you do not specify an encryption key, your output is encrypted
|
4054
4034
|
# with the default Amazon S3 key (SSE-S3).
|
4055
4035
|
#
|
4056
|
-
#
|
4057
|
-
#
|
4036
|
+
# Note that the role making the request and the role specified in the
|
4037
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4038
|
+
# permission to use the specified KMS key.
|
4039
|
+
#
|
4040
|
+
#
|
4058
4041
|
#
|
4059
|
-
#
|
4060
|
-
# the specified KMS key.
|
4042
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4061
4043
|
# @return [String]
|
4062
4044
|
#
|
4063
4045
|
# @!attribute [rw] data_access_role_arn
|
@@ -4172,39 +4154,24 @@ module Aws::TranscribeService
|
|
4172
4154
|
# @return [String]
|
4173
4155
|
#
|
4174
4156
|
# @!attribute [rw] output_encryption_kms_key_id
|
4175
|
-
# The KMS key you want to use to
|
4157
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4158
|
+
# encrypt your Medical Scribe output.
|
4176
4159
|
#
|
4177
|
-
#
|
4178
|
-
# account
|
4160
|
+
# KMS key ARNs have the format
|
4161
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4162
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4163
|
+
# For more information, see [ KMS key ARNs][1].
|
4179
4164
|
#
|
4180
|
-
#
|
4181
|
-
#
|
4182
|
-
#
|
4183
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4184
|
-
# `alias/ExampleAlias`.
|
4185
|
-
#
|
4186
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4187
|
-
# example,
|
4188
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4189
|
-
#
|
4190
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4191
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4192
|
-
#
|
4193
|
-
# If using a key located in a **different** Amazon Web Services
|
4194
|
-
# account than the current Amazon Web Services account, you can
|
4195
|
-
# specify your KMS key in one of two ways:
|
4165
|
+
# If you do not specify an encryption key, your output is encrypted
|
4166
|
+
# with the default Amazon S3 key (SSE-S3).
|
4196
4167
|
#
|
4197
|
-
#
|
4198
|
-
#
|
4168
|
+
# Note that the role making the request and the role specified in the
|
4169
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4170
|
+
# permission to use the specified KMS key.
|
4199
4171
|
#
|
4200
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4201
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4202
4172
|
#
|
4203
|
-
# If you do not specify an encryption key, your output is encrypted
|
4204
|
-
# with the default Amazon S3 key (SSE-S3).
|
4205
4173
|
#
|
4206
|
-
#
|
4207
|
-
# parameter must have permission to use the specified KMS key.
|
4174
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4208
4175
|
# @return [String]
|
4209
4176
|
#
|
4210
4177
|
# @!attribute [rw] kms_encryption_context
|
@@ -4414,43 +4381,24 @@ module Aws::TranscribeService
|
|
4414
4381
|
# @return [String]
|
4415
4382
|
#
|
4416
4383
|
# @!attribute [rw] output_encryption_kms_key_id
|
4417
|
-
# The KMS key you want to use to
|
4418
|
-
# output.
|
4384
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4385
|
+
# encrypt your medical transcription output.
|
4419
4386
|
#
|
4420
|
-
#
|
4421
|
-
# account
|
4422
|
-
#
|
4423
|
-
#
|
4424
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4425
|
-
#
|
4426
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4427
|
-
# `alias/ExampleAlias`.
|
4428
|
-
#
|
4429
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4430
|
-
# example,
|
4431
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4432
|
-
#
|
4433
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4434
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4435
|
-
#
|
4436
|
-
# If using a key located in a **different** Amazon Web Services
|
4437
|
-
# account than the current Amazon Web Services account, you can
|
4438
|
-
# specify your KMS key in one of two ways:
|
4439
|
-
#
|
4440
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
4441
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4442
|
-
#
|
4443
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4444
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4387
|
+
# KMS key ARNs have the format
|
4388
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4389
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4390
|
+
# For more information, see [ KMS key ARNs][1].
|
4445
4391
|
#
|
4446
4392
|
# If you do not specify an encryption key, your output is encrypted
|
4447
4393
|
# with the default Amazon S3 key (SSE-S3).
|
4448
4394
|
#
|
4449
|
-
#
|
4450
|
-
#
|
4395
|
+
# Note that the role making the request and the role specified in the
|
4396
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4397
|
+
# permission to use the specified KMS key.
|
4398
|
+
#
|
4399
|
+
#
|
4451
4400
|
#
|
4452
|
-
#
|
4453
|
-
# the specified KMS key.
|
4401
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4454
4402
|
# @return [String]
|
4455
4403
|
#
|
4456
4404
|
# @!attribute [rw] kms_encryption_context
|
@@ -4674,42 +4622,24 @@ module Aws::TranscribeService
|
|
4674
4622
|
# @return [String]
|
4675
4623
|
#
|
4676
4624
|
# @!attribute [rw] output_encryption_kms_key_id
|
4677
|
-
# The KMS key you want to use to
|
4625
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4626
|
+
# encrypt your transcription output.
|
4678
4627
|
#
|
4679
|
-
#
|
4680
|
-
# account
|
4681
|
-
#
|
4682
|
-
#
|
4683
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4684
|
-
#
|
4685
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4686
|
-
# `alias/ExampleAlias`.
|
4687
|
-
#
|
4688
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4689
|
-
# example,
|
4690
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4691
|
-
#
|
4692
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4693
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4694
|
-
#
|
4695
|
-
# If using a key located in a **different** Amazon Web Services
|
4696
|
-
# account than the current Amazon Web Services account, you can
|
4697
|
-
# specify your KMS key in one of two ways:
|
4698
|
-
#
|
4699
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
4700
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4701
|
-
#
|
4702
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4703
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4628
|
+
# KMS key ARNs have the format
|
4629
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4630
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4631
|
+
# For more information, see [ KMS key ARNs][1].
|
4704
4632
|
#
|
4705
4633
|
# If you do not specify an encryption key, your output is encrypted
|
4706
4634
|
# with the default Amazon S3 key (SSE-S3).
|
4707
4635
|
#
|
4708
|
-
#
|
4709
|
-
#
|
4636
|
+
# Note that the role making the request and the role specified in the
|
4637
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4638
|
+
# permission to use the specified KMS key.
|
4639
|
+
#
|
4640
|
+
#
|
4710
4641
|
#
|
4711
|
-
#
|
4712
|
-
# the specified KMS key.
|
4642
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4713
4643
|
# @return [String]
|
4714
4644
|
#
|
4715
4645
|
# @!attribute [rw] kms_encryption_context
|