aws-sdk-transcribeservice 1.129.0 → 1.130.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-transcribeservice/client.rb +49 -119
- data/lib/aws-sdk-transcribeservice/endpoint_parameters.rb +4 -4
- data/lib/aws-sdk-transcribeservice/types.rb +48 -118
- data/lib/aws-sdk-transcribeservice.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 54f5cc4e6f868a09b1672c42c1797297167a3eddbeb36e2c0104769dbf60a61a
|
4
|
+
data.tar.gz: 2320ee2fa543fd686723373de63b8df2c2672078bb268845c6c43cc1aaeffec5
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 74e31409b0f6597ec14df1b780e691afcb57dacf1bf5b20b9b9578b36e2f531f078daba874d46eb153e923ab93f441010b95602b58ec25524d72a1c8e87c1ff5
|
7
|
+
data.tar.gz: 32e9585867792f98186eb643ad7e955f0f7412bac5aea6f7d3f15839c03cd51e1397632253b67cc59360dfead9e046dde3c7b6c6c954f3821fe0bcc935e5dde2
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.130.0
|
@@ -2790,42 +2790,24 @@ module Aws::TranscribeService
|
|
2790
2790
|
# access your transcript.
|
2791
2791
|
#
|
2792
2792
|
# @option params [String] :output_encryption_kms_key_id
|
2793
|
-
# The KMS key you want to use to
|
2793
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
2794
|
+
# encrypt your Call Analytics output.
|
2794
2795
|
#
|
2795
|
-
#
|
2796
|
-
#
|
2797
|
-
#
|
2798
|
-
#
|
2799
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2800
|
-
#
|
2801
|
-
# 2. Use an alias for the KMS key ID. For example,
|
2802
|
-
# `alias/ExampleAlias`.
|
2803
|
-
#
|
2804
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
2805
|
-
# example,
|
2806
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2807
|
-
#
|
2808
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
2809
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
2810
|
-
#
|
2811
|
-
# If using a key located in a **different** Amazon Web Services account
|
2812
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
2813
|
-
# key in one of two ways:
|
2814
|
-
#
|
2815
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
2816
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2817
|
-
#
|
2818
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
2819
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
2796
|
+
# KMS key ARNs have the format
|
2797
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
2798
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
2799
|
+
# For more information, see [ KMS key ARNs][1].
|
2820
2800
|
#
|
2821
2801
|
# If you do not specify an encryption key, your output is encrypted with
|
2822
2802
|
# the default Amazon S3 key (SSE-S3).
|
2823
2803
|
#
|
2824
|
-
#
|
2825
|
-
#
|
2804
|
+
# Note that the role making the request and the role specified in the
|
2805
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
2806
|
+
# permission to use the specified KMS key.
|
2807
|
+
#
|
2808
|
+
#
|
2826
2809
|
#
|
2827
|
-
#
|
2828
|
-
# specified KMS key.
|
2810
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
2829
2811
|
#
|
2830
2812
|
# @option params [String] :data_access_role_arn
|
2831
2813
|
# The Amazon Resource Name (ARN) of an IAM role that has permissions to
|
@@ -3050,39 +3032,24 @@ module Aws::TranscribeService
|
|
3050
3032
|
# [2]: https://docs.aws.amazon.com/transcribe/latest/dg/security_iam_id-based-policy-examples.html#auth-role-iam-user
|
3051
3033
|
#
|
3052
3034
|
# @option params [String] :output_encryption_kms_key_id
|
3053
|
-
# The KMS key you want to use to
|
3035
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
3036
|
+
# encrypt your Medical Scribe output.
|
3054
3037
|
#
|
3055
|
-
#
|
3056
|
-
#
|
3038
|
+
# KMS key ARNs have the format
|
3039
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
3040
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3041
|
+
# For more information, see [ KMS key ARNs][1].
|
3057
3042
|
#
|
3058
|
-
#
|
3059
|
-
#
|
3060
|
-
#
|
3061
|
-
# 2. Use an alias for the KMS key ID. For example,
|
3062
|
-
# `alias/ExampleAlias`.
|
3063
|
-
#
|
3064
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
3065
|
-
# example,
|
3066
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3067
|
-
#
|
3068
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
3069
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3070
|
-
#
|
3071
|
-
# If using a key located in a **different** Amazon Web Services account
|
3072
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
3073
|
-
# key in one of two ways:
|
3043
|
+
# If you do not specify an encryption key, your output is encrypted with
|
3044
|
+
# the default Amazon S3 key (SSE-S3).
|
3074
3045
|
#
|
3075
|
-
#
|
3076
|
-
#
|
3046
|
+
# Note that the role making the request and the role specified in the
|
3047
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
3048
|
+
# permission to use the specified KMS key.
|
3077
3049
|
#
|
3078
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
3079
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3080
3050
|
#
|
3081
|
-
# If you do not specify an encryption key, your output is encrypted with
|
3082
|
-
# the default Amazon S3 key (SSE-S3).
|
3083
3051
|
#
|
3084
|
-
#
|
3085
|
-
# parameter must have permission to use the specified KMS key.
|
3052
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
3086
3053
|
#
|
3087
3054
|
# @option params [Hash<String,String>] :kms_encryption_context
|
3088
3055
|
# A map of plain text, non-secret key:value pairs, known as encryption
|
@@ -3382,43 +3349,24 @@ module Aws::TranscribeService
|
|
3382
3349
|
# doesn't exist, one is created for you.
|
3383
3350
|
#
|
3384
3351
|
# @option params [String] :output_encryption_kms_key_id
|
3385
|
-
# The KMS key you want to use to
|
3386
|
-
# output.
|
3352
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
3353
|
+
# encrypt your medical transcription output.
|
3387
3354
|
#
|
3388
|
-
#
|
3389
|
-
#
|
3390
|
-
#
|
3391
|
-
#
|
3392
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3393
|
-
#
|
3394
|
-
# 2. Use an alias for the KMS key ID. For example,
|
3395
|
-
# `alias/ExampleAlias`.
|
3396
|
-
#
|
3397
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
3398
|
-
# example,
|
3399
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3400
|
-
#
|
3401
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
3402
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3403
|
-
#
|
3404
|
-
# If using a key located in a **different** Amazon Web Services account
|
3405
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
3406
|
-
# key in one of two ways:
|
3407
|
-
#
|
3408
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
3409
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3410
|
-
#
|
3411
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
3412
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3355
|
+
# KMS key ARNs have the format
|
3356
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
3357
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3358
|
+
# For more information, see [ KMS key ARNs][1].
|
3413
3359
|
#
|
3414
3360
|
# If you do not specify an encryption key, your output is encrypted with
|
3415
3361
|
# the default Amazon S3 key (SSE-S3).
|
3416
3362
|
#
|
3417
|
-
#
|
3418
|
-
#
|
3363
|
+
# Note that the role making the request and the role specified in the
|
3364
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
3365
|
+
# permission to use the specified KMS key.
|
3366
|
+
#
|
3367
|
+
#
|
3419
3368
|
#
|
3420
|
-
#
|
3421
|
-
# specified KMS key.
|
3369
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
3422
3370
|
#
|
3423
3371
|
# @option params [Hash<String,String>] :kms_encryption_context
|
3424
3372
|
# A map of plain text, non-secret key:value pairs, known as encryption
|
@@ -3701,42 +3649,24 @@ module Aws::TranscribeService
|
|
3701
3649
|
# doesn't exist, one is created for you.
|
3702
3650
|
#
|
3703
3651
|
# @option params [String] :output_encryption_kms_key_id
|
3704
|
-
# The KMS key you want to use to
|
3652
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
3653
|
+
# encrypt your transcription output.
|
3705
3654
|
#
|
3706
|
-
#
|
3707
|
-
#
|
3708
|
-
#
|
3709
|
-
#
|
3710
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3711
|
-
#
|
3712
|
-
# 2. Use an alias for the KMS key ID. For example,
|
3713
|
-
# `alias/ExampleAlias`.
|
3714
|
-
#
|
3715
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
3716
|
-
# example,
|
3717
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3718
|
-
#
|
3719
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
3720
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3721
|
-
#
|
3722
|
-
# If using a key located in a **different** Amazon Web Services account
|
3723
|
-
# than the current Amazon Web Services account, you can specify your KMS
|
3724
|
-
# key in one of two ways:
|
3725
|
-
#
|
3726
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
3727
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3728
|
-
#
|
3729
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
3730
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
3655
|
+
# KMS key ARNs have the format
|
3656
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
3657
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
3658
|
+
# For more information, see [ KMS key ARNs][1].
|
3731
3659
|
#
|
3732
3660
|
# If you do not specify an encryption key, your output is encrypted with
|
3733
3661
|
# the default Amazon S3 key (SSE-S3).
|
3734
3662
|
#
|
3735
|
-
#
|
3736
|
-
#
|
3663
|
+
# Note that the role making the request and the role specified in the
|
3664
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
3665
|
+
# permission to use the specified KMS key.
|
3666
|
+
#
|
3667
|
+
#
|
3737
3668
|
#
|
3738
|
-
#
|
3739
|
-
# specified KMS key.
|
3669
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
3740
3670
|
#
|
3741
3671
|
# @option params [Hash<String,String>] :kms_encryption_context
|
3742
3672
|
# A map of plain text, non-secret key:value pairs, known as encryption
|
@@ -4584,7 +4514,7 @@ module Aws::TranscribeService
|
|
4584
4514
|
tracer: tracer
|
4585
4515
|
)
|
4586
4516
|
context[:gem_name] = 'aws-sdk-transcribeservice'
|
4587
|
-
context[:gem_version] = '1.
|
4517
|
+
context[:gem_version] = '1.130.0'
|
4588
4518
|
Seahorse::Client::Request.new(handlers, context)
|
4589
4519
|
end
|
4590
4520
|
|
@@ -13,22 +13,22 @@ module Aws::TranscribeService
|
|
13
13
|
# @!attribute region
|
14
14
|
# The AWS region used to dispatch the request.
|
15
15
|
#
|
16
|
-
# @return [
|
16
|
+
# @return [string]
|
17
17
|
#
|
18
18
|
# @!attribute use_dual_stack
|
19
19
|
# When true, use the dual-stack endpoint. If the configured endpoint does not support dual-stack, dispatching the request MAY return an error.
|
20
20
|
#
|
21
|
-
# @return [
|
21
|
+
# @return [boolean]
|
22
22
|
#
|
23
23
|
# @!attribute use_fips
|
24
24
|
# When true, send this request to the FIPS-compliant regional endpoint. If the configured endpoint does not have a FIPS compliant endpoint, dispatching the request will return an error.
|
25
25
|
#
|
26
|
-
# @return [
|
26
|
+
# @return [boolean]
|
27
27
|
#
|
28
28
|
# @!attribute endpoint
|
29
29
|
# Override the endpoint used to send this request
|
30
30
|
#
|
31
|
-
# @return [
|
31
|
+
# @return [string]
|
32
32
|
#
|
33
33
|
EndpointParameters = Struct.new(
|
34
34
|
:region,
|
@@ -4059,42 +4059,24 @@ module Aws::TranscribeService
|
|
4059
4059
|
# @return [String]
|
4060
4060
|
#
|
4061
4061
|
# @!attribute [rw] output_encryption_kms_key_id
|
4062
|
-
# The KMS key you want to use to
|
4062
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4063
|
+
# encrypt your Call Analytics output.
|
4063
4064
|
#
|
4064
|
-
#
|
4065
|
-
# account
|
4066
|
-
#
|
4067
|
-
#
|
4068
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4069
|
-
#
|
4070
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4071
|
-
# `alias/ExampleAlias`.
|
4072
|
-
#
|
4073
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4074
|
-
# example,
|
4075
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4076
|
-
#
|
4077
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4078
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4079
|
-
#
|
4080
|
-
# If using a key located in a **different** Amazon Web Services
|
4081
|
-
# account than the current Amazon Web Services account, you can
|
4082
|
-
# specify your KMS key in one of two ways:
|
4083
|
-
#
|
4084
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
4085
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4086
|
-
#
|
4087
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4088
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4065
|
+
# KMS key ARNs have the format
|
4066
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4067
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4068
|
+
# For more information, see [ KMS key ARNs][1].
|
4089
4069
|
#
|
4090
4070
|
# If you do not specify an encryption key, your output is encrypted
|
4091
4071
|
# with the default Amazon S3 key (SSE-S3).
|
4092
4072
|
#
|
4093
|
-
#
|
4094
|
-
#
|
4073
|
+
# Note that the role making the request and the role specified in the
|
4074
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4075
|
+
# permission to use the specified KMS key.
|
4076
|
+
#
|
4077
|
+
#
|
4095
4078
|
#
|
4096
|
-
#
|
4097
|
-
# the specified KMS key.
|
4079
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4098
4080
|
# @return [String]
|
4099
4081
|
#
|
4100
4082
|
# @!attribute [rw] data_access_role_arn
|
@@ -4209,39 +4191,24 @@ module Aws::TranscribeService
|
|
4209
4191
|
# @return [String]
|
4210
4192
|
#
|
4211
4193
|
# @!attribute [rw] output_encryption_kms_key_id
|
4212
|
-
# The KMS key you want to use to
|
4194
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4195
|
+
# encrypt your Medical Scribe output.
|
4213
4196
|
#
|
4214
|
-
#
|
4215
|
-
# account
|
4197
|
+
# KMS key ARNs have the format
|
4198
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4199
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4200
|
+
# For more information, see [ KMS key ARNs][1].
|
4216
4201
|
#
|
4217
|
-
#
|
4218
|
-
#
|
4219
|
-
#
|
4220
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4221
|
-
# `alias/ExampleAlias`.
|
4222
|
-
#
|
4223
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4224
|
-
# example,
|
4225
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4226
|
-
#
|
4227
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4228
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4229
|
-
#
|
4230
|
-
# If using a key located in a **different** Amazon Web Services
|
4231
|
-
# account than the current Amazon Web Services account, you can
|
4232
|
-
# specify your KMS key in one of two ways:
|
4202
|
+
# If you do not specify an encryption key, your output is encrypted
|
4203
|
+
# with the default Amazon S3 key (SSE-S3).
|
4233
4204
|
#
|
4234
|
-
#
|
4235
|
-
#
|
4205
|
+
# Note that the role making the request and the role specified in the
|
4206
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4207
|
+
# permission to use the specified KMS key.
|
4236
4208
|
#
|
4237
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4238
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4239
4209
|
#
|
4240
|
-
# If you do not specify an encryption key, your output is encrypted
|
4241
|
-
# with the default Amazon S3 key (SSE-S3).
|
4242
4210
|
#
|
4243
|
-
#
|
4244
|
-
# parameter must have permission to use the specified KMS key.
|
4211
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4245
4212
|
# @return [String]
|
4246
4213
|
#
|
4247
4214
|
# @!attribute [rw] kms_encryption_context
|
@@ -4458,43 +4425,24 @@ module Aws::TranscribeService
|
|
4458
4425
|
# @return [String]
|
4459
4426
|
#
|
4460
4427
|
# @!attribute [rw] output_encryption_kms_key_id
|
4461
|
-
# The KMS key you want to use to
|
4462
|
-
# output.
|
4428
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4429
|
+
# encrypt your medical transcription output.
|
4463
4430
|
#
|
4464
|
-
#
|
4465
|
-
# account
|
4466
|
-
#
|
4467
|
-
#
|
4468
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4469
|
-
#
|
4470
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4471
|
-
# `alias/ExampleAlias`.
|
4472
|
-
#
|
4473
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4474
|
-
# example,
|
4475
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4476
|
-
#
|
4477
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4478
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4479
|
-
#
|
4480
|
-
# If using a key located in a **different** Amazon Web Services
|
4481
|
-
# account than the current Amazon Web Services account, you can
|
4482
|
-
# specify your KMS key in one of two ways:
|
4483
|
-
#
|
4484
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
4485
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4486
|
-
#
|
4487
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4488
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4431
|
+
# KMS key ARNs have the format
|
4432
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4433
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4434
|
+
# For more information, see [ KMS key ARNs][1].
|
4489
4435
|
#
|
4490
4436
|
# If you do not specify an encryption key, your output is encrypted
|
4491
4437
|
# with the default Amazon S3 key (SSE-S3).
|
4492
4438
|
#
|
4493
|
-
#
|
4494
|
-
#
|
4439
|
+
# Note that the role making the request and the role specified in the
|
4440
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4441
|
+
# permission to use the specified KMS key.
|
4442
|
+
#
|
4443
|
+
#
|
4495
4444
|
#
|
4496
|
-
#
|
4497
|
-
# the specified KMS key.
|
4445
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4498
4446
|
# @return [String]
|
4499
4447
|
#
|
4500
4448
|
# @!attribute [rw] kms_encryption_context
|
@@ -4718,42 +4666,24 @@ module Aws::TranscribeService
|
|
4718
4666
|
# @return [String]
|
4719
4667
|
#
|
4720
4668
|
# @!attribute [rw] output_encryption_kms_key_id
|
4721
|
-
# The KMS key you want to use to
|
4669
|
+
# The Amazon Resource Name (ARN) of a KMS key that you want to use to
|
4670
|
+
# encrypt your transcription output.
|
4722
4671
|
#
|
4723
|
-
#
|
4724
|
-
# account
|
4725
|
-
#
|
4726
|
-
#
|
4727
|
-
# `1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4728
|
-
#
|
4729
|
-
# 2. Use an alias for the KMS key ID. For example,
|
4730
|
-
# `alias/ExampleAlias`.
|
4731
|
-
#
|
4732
|
-
# 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
|
4733
|
-
# example,
|
4734
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4735
|
-
#
|
4736
|
-
# 4. Use the ARN for the KMS key alias. For example,
|
4737
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4738
|
-
#
|
4739
|
-
# If using a key located in a **different** Amazon Web Services
|
4740
|
-
# account than the current Amazon Web Services account, you can
|
4741
|
-
# specify your KMS key in one of two ways:
|
4742
|
-
#
|
4743
|
-
# 1. Use the ARN for the KMS key ID. For example,
|
4744
|
-
# `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4745
|
-
#
|
4746
|
-
# 2. Use the ARN for the KMS key alias. For example,
|
4747
|
-
# `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
|
4672
|
+
# KMS key ARNs have the format
|
4673
|
+
# `arn:partition:kms:region:account:key/key-id`. For example:
|
4674
|
+
# `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
|
4675
|
+
# For more information, see [ KMS key ARNs][1].
|
4748
4676
|
#
|
4749
4677
|
# If you do not specify an encryption key, your output is encrypted
|
4750
4678
|
# with the default Amazon S3 key (SSE-S3).
|
4751
4679
|
#
|
4752
|
-
#
|
4753
|
-
#
|
4680
|
+
# Note that the role making the request and the role specified in the
|
4681
|
+
# `DataAccessRoleArn` request parameter (if present) must have
|
4682
|
+
# permission to use the specified KMS key.
|
4683
|
+
#
|
4684
|
+
#
|
4754
4685
|
#
|
4755
|
-
#
|
4756
|
-
# the specified KMS key.
|
4686
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
|
4757
4687
|
# @return [String]
|
4758
4688
|
#
|
4759
4689
|
# @!attribute [rw] kms_encryption_context
|