aws-sdk-transcribeservice 1.125.0 → 1.126.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7feca1ea9aafba659c172a8e8958a1acbd72409aedc854eccee79eb2c3359258
4
- data.tar.gz: 012c2695379f74a80ce2deb55787c8eaa2043418efdf929bf73f9f7ccf2790e7
3
+ metadata.gz: 84d5d756a1ab931c0b9ef8a7851da141fd7e98c5f722622ba6feb0115db5f286
4
+ data.tar.gz: 12bc05abe3d48cc4a5571f93426d30915cca5414787782dbe592a9da0555f39f
5
5
  SHA512:
6
- metadata.gz: 62c4677448c8a5d4943e6ff7ae05fafa63fd13e74fabd2c4568ee40d1d1ef815b48388fc2f30ece9c1bf479c6e112ac280867066b5b123a945be70ce781c8089
7
- data.tar.gz: 649e252684dcb7829b3e1b06e760fc2b402bd22e0be859dd985d9eaaf6d4349da988434883bf0046a1f649d3326bda6420b4a390f5c34590e24002396b7e8d11
6
+ metadata.gz: 5f194b2d8583540bd52b87da48c463e3972ee5244c0990c2549df201085935686c3223e319acc32cfd80e928726af95a1d5ef5aa975aeb3c884ad971d87b5712
7
+ data.tar.gz: 391e48ff84fa65bff7f14646e5d25114998a19e08b23fb3daed0103b7b4f2df0f00d91a916f3aeed6af785862c622f222c33634e0bb7dbad1eb346fe66bd6795
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.126.0 (2025-08-08)
5
+ ------------------
6
+
7
+ * Feature - Update documentation to use key ARN only in OutputEncryptionKMSKeyId request parameter
8
+
4
9
  1.125.0 (2025-08-04)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.125.0
1
+ 1.126.0
@@ -2789,42 +2789,24 @@ module Aws::TranscribeService
2789
2789
  # access your transcript.
2790
2790
  #
2791
2791
  # @option params [String] :output_encryption_kms_key_id
2792
- # The KMS key you want to use to encrypt your Call Analytics output.
2792
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
2793
+ # encrypt your Call Analytics output.
2793
2794
  #
2794
- # If using a key located in the **current** Amazon Web Services account,
2795
- # you can specify your KMS key in one of four ways:
2796
- #
2797
- # 1. Use the KMS key ID itself. For example,
2798
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
2799
- #
2800
- # 2. Use an alias for the KMS key ID. For example,
2801
- # `alias/ExampleAlias`.
2802
- #
2803
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
2804
- # example,
2805
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
2806
- #
2807
- # 4. Use the ARN for the KMS key alias. For example,
2808
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
2809
- #
2810
- # If using a key located in a **different** Amazon Web Services account
2811
- # than the current Amazon Web Services account, you can specify your KMS
2812
- # key in one of two ways:
2813
- #
2814
- # 1. Use the ARN for the KMS key ID. For example,
2815
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
2816
- #
2817
- # 2. Use the ARN for the KMS key alias. For example,
2818
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
2795
+ # KMS key ARNs have the format
2796
+ # `arn:partition:kms:region:account:key/key-id`. For example:
2797
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
2798
+ # For more information, see [ KMS key ARNs][1].
2819
2799
  #
2820
2800
  # If you do not specify an encryption key, your output is encrypted with
2821
2801
  # the default Amazon S3 key (SSE-S3).
2822
2802
  #
2823
- # If you specify a KMS key to encrypt your output, you must also specify
2824
- # an output location using the `OutputLocation` parameter.
2803
+ # Note that the role making the request and the role specified in the
2804
+ # `DataAccessRoleArn` request parameter (if present) must have
2805
+ # permission to use the specified KMS key.
2806
+ #
2807
+ #
2825
2808
  #
2826
- # Note that the role making the request must have permission to use the
2827
- # specified KMS key.
2809
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
2828
2810
  #
2829
2811
  # @option params [String] :data_access_role_arn
2830
2812
  # The Amazon Resource Name (ARN) of an IAM role that has permissions to
@@ -3049,39 +3031,24 @@ module Aws::TranscribeService
3049
3031
  # [2]: https://docs.aws.amazon.com/transcribe/latest/dg/security_iam_id-based-policy-examples.html#auth-role-iam-user
3050
3032
  #
3051
3033
  # @option params [String] :output_encryption_kms_key_id
3052
- # The KMS key you want to use to encrypt your Medical Scribe output.
3034
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
3035
+ # encrypt your Medical Scribe output.
3053
3036
  #
3054
- # If using a key located in the **current** Amazon Web Services account,
3055
- # you can specify your KMS key in one of four ways:
3037
+ # KMS key ARNs have the format
3038
+ # `arn:partition:kms:region:account:key/key-id`. For example:
3039
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3040
+ # For more information, see [ KMS key ARNs][1].
3056
3041
  #
3057
- # 1. Use the KMS key ID itself. For example,
3058
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
3059
- #
3060
- # 2. Use an alias for the KMS key ID. For example,
3061
- # `alias/ExampleAlias`.
3062
- #
3063
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
3064
- # example,
3065
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3066
- #
3067
- # 4. Use the ARN for the KMS key alias. For example,
3068
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3069
- #
3070
- # If using a key located in a **different** Amazon Web Services account
3071
- # than the current Amazon Web Services account, you can specify your KMS
3072
- # key in one of two ways:
3042
+ # If you do not specify an encryption key, your output is encrypted with
3043
+ # the default Amazon S3 key (SSE-S3).
3073
3044
  #
3074
- # 1. Use the ARN for the KMS key ID. For example,
3075
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3045
+ # Note that the role making the request and the role specified in the
3046
+ # `DataAccessRoleArn` request parameter (if present) must have
3047
+ # permission to use the specified KMS key.
3076
3048
  #
3077
- # 2. Use the ARN for the KMS key alias. For example,
3078
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3079
3049
  #
3080
- # If you do not specify an encryption key, your output is encrypted with
3081
- # the default Amazon S3 key (SSE-S3).
3082
3050
  #
3083
- # Note that the role specified in the `DataAccessRoleArn` request
3084
- # parameter must have permission to use the specified KMS key.
3051
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
3085
3052
  #
3086
3053
  # @option params [Hash<String,String>] :kms_encryption_context
3087
3054
  # A map of plain text, non-secret key:value pairs, known as encryption
@@ -3370,43 +3337,24 @@ module Aws::TranscribeService
3370
3337
  # doesn't exist, one is created for you.
3371
3338
  #
3372
3339
  # @option params [String] :output_encryption_kms_key_id
3373
- # The KMS key you want to use to encrypt your medical transcription
3374
- # output.
3340
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
3341
+ # encrypt your medical transcription output.
3375
3342
  #
3376
- # If using a key located in the **current** Amazon Web Services account,
3377
- # you can specify your KMS key in one of four ways:
3378
- #
3379
- # 1. Use the KMS key ID itself. For example,
3380
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
3381
- #
3382
- # 2. Use an alias for the KMS key ID. For example,
3383
- # `alias/ExampleAlias`.
3384
- #
3385
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
3386
- # example,
3387
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3388
- #
3389
- # 4. Use the ARN for the KMS key alias. For example,
3390
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3391
- #
3392
- # If using a key located in a **different** Amazon Web Services account
3393
- # than the current Amazon Web Services account, you can specify your KMS
3394
- # key in one of two ways:
3395
- #
3396
- # 1. Use the ARN for the KMS key ID. For example,
3397
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3398
- #
3399
- # 2. Use the ARN for the KMS key alias. For example,
3400
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3343
+ # KMS key ARNs have the format
3344
+ # `arn:partition:kms:region:account:key/key-id`. For example:
3345
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3346
+ # For more information, see [ KMS key ARNs][1].
3401
3347
  #
3402
3348
  # If you do not specify an encryption key, your output is encrypted with
3403
3349
  # the default Amazon S3 key (SSE-S3).
3404
3350
  #
3405
- # If you specify a KMS key to encrypt your output, you must also specify
3406
- # an output location using the `OutputLocation` parameter.
3351
+ # Note that the role making the request and the role specified in the
3352
+ # `DataAccessRoleArn` request parameter (if present) must have
3353
+ # permission to use the specified KMS key.
3354
+ #
3355
+ #
3407
3356
  #
3408
- # Note that the role making the request must have permission to use the
3409
- # specified KMS key.
3357
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
3410
3358
  #
3411
3359
  # @option params [Hash<String,String>] :kms_encryption_context
3412
3360
  # A map of plain text, non-secret key:value pairs, known as encryption
@@ -3689,42 +3637,24 @@ module Aws::TranscribeService
3689
3637
  # doesn't exist, one is created for you.
3690
3638
  #
3691
3639
  # @option params [String] :output_encryption_kms_key_id
3692
- # The KMS key you want to use to encrypt your transcription output.
3640
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
3641
+ # encrypt your transcription output.
3693
3642
  #
3694
- # If using a key located in the **current** Amazon Web Services account,
3695
- # you can specify your KMS key in one of four ways:
3696
- #
3697
- # 1. Use the KMS key ID itself. For example,
3698
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
3699
- #
3700
- # 2. Use an alias for the KMS key ID. For example,
3701
- # `alias/ExampleAlias`.
3702
- #
3703
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
3704
- # example,
3705
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3706
- #
3707
- # 4. Use the ARN for the KMS key alias. For example,
3708
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3709
- #
3710
- # If using a key located in a **different** Amazon Web Services account
3711
- # than the current Amazon Web Services account, you can specify your KMS
3712
- # key in one of two ways:
3713
- #
3714
- # 1. Use the ARN for the KMS key ID. For example,
3715
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3716
- #
3717
- # 2. Use the ARN for the KMS key alias. For example,
3718
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3643
+ # KMS key ARNs have the format
3644
+ # `arn:partition:kms:region:account:key/key-id`. For example:
3645
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3646
+ # For more information, see [ KMS key ARNs][1].
3719
3647
  #
3720
3648
  # If you do not specify an encryption key, your output is encrypted with
3721
3649
  # the default Amazon S3 key (SSE-S3).
3722
3650
  #
3723
- # If you specify a KMS key to encrypt your output, you must also specify
3724
- # an output location using the `OutputLocation` parameter.
3651
+ # Note that the role making the request and the role specified in the
3652
+ # `DataAccessRoleArn` request parameter (if present) must have
3653
+ # permission to use the specified KMS key.
3654
+ #
3655
+ #
3725
3656
  #
3726
- # Note that the role making the request must have permission to use the
3727
- # specified KMS key.
3657
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
3728
3658
  #
3729
3659
  # @option params [Hash<String,String>] :kms_encryption_context
3730
3660
  # A map of plain text, non-secret key:value pairs, known as encryption
@@ -4572,7 +4502,7 @@ module Aws::TranscribeService
4572
4502
  tracer: tracer
4573
4503
  )
4574
4504
  context[:gem_name] = 'aws-sdk-transcribeservice'
4575
- context[:gem_version] = '1.125.0'
4505
+ context[:gem_version] = '1.126.0'
4576
4506
  Seahorse::Client::Request.new(handlers, context)
4577
4507
  end
4578
4508
 
@@ -4022,42 +4022,24 @@ module Aws::TranscribeService
4022
4022
  # @return [String]
4023
4023
  #
4024
4024
  # @!attribute [rw] output_encryption_kms_key_id
4025
- # The KMS key you want to use to encrypt your Call Analytics output.
4025
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4026
+ # encrypt your Call Analytics output.
4026
4027
  #
4027
- # If using a key located in the **current** Amazon Web Services
4028
- # account, you can specify your KMS key in one of four ways:
4029
- #
4030
- # 1. Use the KMS key ID itself. For example,
4031
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4032
- #
4033
- # 2. Use an alias for the KMS key ID. For example,
4034
- # `alias/ExampleAlias`.
4035
- #
4036
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4037
- # example,
4038
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4039
- #
4040
- # 4. Use the ARN for the KMS key alias. For example,
4041
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4042
- #
4043
- # If using a key located in a **different** Amazon Web Services
4044
- # account than the current Amazon Web Services account, you can
4045
- # specify your KMS key in one of two ways:
4046
- #
4047
- # 1. Use the ARN for the KMS key ID. For example,
4048
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4049
- #
4050
- # 2. Use the ARN for the KMS key alias. For example,
4051
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4028
+ # KMS key ARNs have the format
4029
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4030
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4031
+ # For more information, see [ KMS key ARNs][1].
4052
4032
  #
4053
4033
  # If you do not specify an encryption key, your output is encrypted
4054
4034
  # with the default Amazon S3 key (SSE-S3).
4055
4035
  #
4056
- # If you specify a KMS key to encrypt your output, you must also
4057
- # specify an output location using the `OutputLocation` parameter.
4036
+ # Note that the role making the request and the role specified in the
4037
+ # `DataAccessRoleArn` request parameter (if present) must have
4038
+ # permission to use the specified KMS key.
4039
+ #
4040
+ #
4058
4041
  #
4059
- # Note that the role making the request must have permission to use
4060
- # the specified KMS key.
4042
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4061
4043
  # @return [String]
4062
4044
  #
4063
4045
  # @!attribute [rw] data_access_role_arn
@@ -4172,39 +4154,24 @@ module Aws::TranscribeService
4172
4154
  # @return [String]
4173
4155
  #
4174
4156
  # @!attribute [rw] output_encryption_kms_key_id
4175
- # The KMS key you want to use to encrypt your Medical Scribe output.
4157
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4158
+ # encrypt your Medical Scribe output.
4176
4159
  #
4177
- # If using a key located in the **current** Amazon Web Services
4178
- # account, you can specify your KMS key in one of four ways:
4160
+ # KMS key ARNs have the format
4161
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4162
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4163
+ # For more information, see [ KMS key ARNs][1].
4179
4164
  #
4180
- # 1. Use the KMS key ID itself. For example,
4181
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4182
- #
4183
- # 2. Use an alias for the KMS key ID. For example,
4184
- # `alias/ExampleAlias`.
4185
- #
4186
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4187
- # example,
4188
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4189
- #
4190
- # 4. Use the ARN for the KMS key alias. For example,
4191
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4192
- #
4193
- # If using a key located in a **different** Amazon Web Services
4194
- # account than the current Amazon Web Services account, you can
4195
- # specify your KMS key in one of two ways:
4165
+ # If you do not specify an encryption key, your output is encrypted
4166
+ # with the default Amazon S3 key (SSE-S3).
4196
4167
  #
4197
- # 1. Use the ARN for the KMS key ID. For example,
4198
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4168
+ # Note that the role making the request and the role specified in the
4169
+ # `DataAccessRoleArn` request parameter (if present) must have
4170
+ # permission to use the specified KMS key.
4199
4171
  #
4200
- # 2. Use the ARN for the KMS key alias. For example,
4201
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4202
4172
  #
4203
- # If you do not specify an encryption key, your output is encrypted
4204
- # with the default Amazon S3 key (SSE-S3).
4205
4173
  #
4206
- # Note that the role specified in the `DataAccessRoleArn` request
4207
- # parameter must have permission to use the specified KMS key.
4174
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4208
4175
  # @return [String]
4209
4176
  #
4210
4177
  # @!attribute [rw] kms_encryption_context
@@ -4414,43 +4381,24 @@ module Aws::TranscribeService
4414
4381
  # @return [String]
4415
4382
  #
4416
4383
  # @!attribute [rw] output_encryption_kms_key_id
4417
- # The KMS key you want to use to encrypt your medical transcription
4418
- # output.
4384
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4385
+ # encrypt your medical transcription output.
4419
4386
  #
4420
- # If using a key located in the **current** Amazon Web Services
4421
- # account, you can specify your KMS key in one of four ways:
4422
- #
4423
- # 1. Use the KMS key ID itself. For example,
4424
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4425
- #
4426
- # 2. Use an alias for the KMS key ID. For example,
4427
- # `alias/ExampleAlias`.
4428
- #
4429
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4430
- # example,
4431
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4432
- #
4433
- # 4. Use the ARN for the KMS key alias. For example,
4434
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4435
- #
4436
- # If using a key located in a **different** Amazon Web Services
4437
- # account than the current Amazon Web Services account, you can
4438
- # specify your KMS key in one of two ways:
4439
- #
4440
- # 1. Use the ARN for the KMS key ID. For example,
4441
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4442
- #
4443
- # 2. Use the ARN for the KMS key alias. For example,
4444
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4387
+ # KMS key ARNs have the format
4388
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4389
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4390
+ # For more information, see [ KMS key ARNs][1].
4445
4391
  #
4446
4392
  # If you do not specify an encryption key, your output is encrypted
4447
4393
  # with the default Amazon S3 key (SSE-S3).
4448
4394
  #
4449
- # If you specify a KMS key to encrypt your output, you must also
4450
- # specify an output location using the `OutputLocation` parameter.
4395
+ # Note that the role making the request and the role specified in the
4396
+ # `DataAccessRoleArn` request parameter (if present) must have
4397
+ # permission to use the specified KMS key.
4398
+ #
4399
+ #
4451
4400
  #
4452
- # Note that the role making the request must have permission to use
4453
- # the specified KMS key.
4401
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4454
4402
  # @return [String]
4455
4403
  #
4456
4404
  # @!attribute [rw] kms_encryption_context
@@ -4674,42 +4622,24 @@ module Aws::TranscribeService
4674
4622
  # @return [String]
4675
4623
  #
4676
4624
  # @!attribute [rw] output_encryption_kms_key_id
4677
- # The KMS key you want to use to encrypt your transcription output.
4625
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4626
+ # encrypt your transcription output.
4678
4627
  #
4679
- # If using a key located in the **current** Amazon Web Services
4680
- # account, you can specify your KMS key in one of four ways:
4681
- #
4682
- # 1. Use the KMS key ID itself. For example,
4683
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4684
- #
4685
- # 2. Use an alias for the KMS key ID. For example,
4686
- # `alias/ExampleAlias`.
4687
- #
4688
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4689
- # example,
4690
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4691
- #
4692
- # 4. Use the ARN for the KMS key alias. For example,
4693
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4694
- #
4695
- # If using a key located in a **different** Amazon Web Services
4696
- # account than the current Amazon Web Services account, you can
4697
- # specify your KMS key in one of two ways:
4698
- #
4699
- # 1. Use the ARN for the KMS key ID. For example,
4700
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4701
- #
4702
- # 2. Use the ARN for the KMS key alias. For example,
4703
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4628
+ # KMS key ARNs have the format
4629
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4630
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4631
+ # For more information, see [ KMS key ARNs][1].
4704
4632
  #
4705
4633
  # If you do not specify an encryption key, your output is encrypted
4706
4634
  # with the default Amazon S3 key (SSE-S3).
4707
4635
  #
4708
- # If you specify a KMS key to encrypt your output, you must also
4709
- # specify an output location using the `OutputLocation` parameter.
4636
+ # Note that the role making the request and the role specified in the
4637
+ # `DataAccessRoleArn` request parameter (if present) must have
4638
+ # permission to use the specified KMS key.
4639
+ #
4640
+ #
4710
4641
  #
4711
- # Note that the role making the request must have permission to use
4712
- # the specified KMS key.
4642
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4713
4643
  # @return [String]
4714
4644
  #
4715
4645
  # @!attribute [rw] kms_encryption_context
@@ -54,7 +54,7 @@ module Aws::TranscribeService
54
54
  autoload :EndpointProvider, 'aws-sdk-transcribeservice/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-transcribeservice/endpoints'
56
56
 
57
- GEM_VERSION = '1.125.0'
57
+ GEM_VERSION = '1.126.0'
58
58
 
59
59
  end
60
60
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-transcribeservice
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.125.0
4
+ version: 1.126.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services