aws-sdk-transcribeservice 1.129.0 → 1.130.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7c4215544b002eda32b7981a765c4a1a91621228280acef824dd9057feb889d8
4
- data.tar.gz: 4ac1d7947cb4b4790873c2e12180b6650251d1835204a54417bc64adce317e08
3
+ metadata.gz: 54f5cc4e6f868a09b1672c42c1797297167a3eddbeb36e2c0104769dbf60a61a
4
+ data.tar.gz: 2320ee2fa543fd686723373de63b8df2c2672078bb268845c6c43cc1aaeffec5
5
5
  SHA512:
6
- metadata.gz: 7cd16d5958df2fb25ac567731403f4077238bc2d5cbcd3251cc6d8ce31ae2f511e7954e48236784e83d4a297ab60ef5f2b4fd80534c5daa41bf82b81c3bda5d2
7
- data.tar.gz: 88407e14370b00dd0ddcc92fc0f0c568479e32d94311aceb699816591b04c8e6f46f0bf4f73a3b5e3e288a93f38d5c6b7878e06069e9045bb5475ecec59ab7a1
6
+ metadata.gz: 74e31409b0f6597ec14df1b780e691afcb57dacf1bf5b20b9b9578b36e2f531f078daba874d46eb153e923ab93f441010b95602b58ec25524d72a1c8e87c1ff5
7
+ data.tar.gz: 32e9585867792f98186eb643ad7e955f0f7412bac5aea6f7d3f15839c03cd51e1397632253b67cc59360dfead9e046dde3c7b6c6c954f3821fe0bcc935e5dde2
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.130.0 (2025-10-14)
5
+ ------------------
6
+
7
+ * Feature - Move UntagResource API body member to query parameter
8
+
4
9
  1.129.0 (2025-08-26)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.129.0
1
+ 1.130.0
@@ -2790,42 +2790,24 @@ module Aws::TranscribeService
2790
2790
  # access your transcript.
2791
2791
  #
2792
2792
  # @option params [String] :output_encryption_kms_key_id
2793
- # The KMS key you want to use to encrypt your Call Analytics output.
2793
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
2794
+ # encrypt your Call Analytics output.
2794
2795
  #
2795
- # If using a key located in the **current** Amazon Web Services account,
2796
- # you can specify your KMS key in one of four ways:
2797
- #
2798
- # 1. Use the KMS key ID itself. For example,
2799
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
2800
- #
2801
- # 2. Use an alias for the KMS key ID. For example,
2802
- # `alias/ExampleAlias`.
2803
- #
2804
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
2805
- # example,
2806
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
2807
- #
2808
- # 4. Use the ARN for the KMS key alias. For example,
2809
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
2810
- #
2811
- # If using a key located in a **different** Amazon Web Services account
2812
- # than the current Amazon Web Services account, you can specify your KMS
2813
- # key in one of two ways:
2814
- #
2815
- # 1. Use the ARN for the KMS key ID. For example,
2816
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
2817
- #
2818
- # 2. Use the ARN for the KMS key alias. For example,
2819
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
2796
+ # KMS key ARNs have the format
2797
+ # `arn:partition:kms:region:account:key/key-id`. For example:
2798
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
2799
+ # For more information, see [ KMS key ARNs][1].
2820
2800
  #
2821
2801
  # If you do not specify an encryption key, your output is encrypted with
2822
2802
  # the default Amazon S3 key (SSE-S3).
2823
2803
  #
2824
- # If you specify a KMS key to encrypt your output, you must also specify
2825
- # an output location using the `OutputLocation` parameter.
2804
+ # Note that the role making the request and the role specified in the
2805
+ # `DataAccessRoleArn` request parameter (if present) must have
2806
+ # permission to use the specified KMS key.
2807
+ #
2808
+ #
2826
2809
  #
2827
- # Note that the role making the request must have permission to use the
2828
- # specified KMS key.
2810
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
2829
2811
  #
2830
2812
  # @option params [String] :data_access_role_arn
2831
2813
  # The Amazon Resource Name (ARN) of an IAM role that has permissions to
@@ -3050,39 +3032,24 @@ module Aws::TranscribeService
3050
3032
  # [2]: https://docs.aws.amazon.com/transcribe/latest/dg/security_iam_id-based-policy-examples.html#auth-role-iam-user
3051
3033
  #
3052
3034
  # @option params [String] :output_encryption_kms_key_id
3053
- # The KMS key you want to use to encrypt your Medical Scribe output.
3035
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
3036
+ # encrypt your Medical Scribe output.
3054
3037
  #
3055
- # If using a key located in the **current** Amazon Web Services account,
3056
- # you can specify your KMS key in one of four ways:
3038
+ # KMS key ARNs have the format
3039
+ # `arn:partition:kms:region:account:key/key-id`. For example:
3040
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3041
+ # For more information, see [ KMS key ARNs][1].
3057
3042
  #
3058
- # 1. Use the KMS key ID itself. For example,
3059
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
3060
- #
3061
- # 2. Use an alias for the KMS key ID. For example,
3062
- # `alias/ExampleAlias`.
3063
- #
3064
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
3065
- # example,
3066
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3067
- #
3068
- # 4. Use the ARN for the KMS key alias. For example,
3069
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3070
- #
3071
- # If using a key located in a **different** Amazon Web Services account
3072
- # than the current Amazon Web Services account, you can specify your KMS
3073
- # key in one of two ways:
3043
+ # If you do not specify an encryption key, your output is encrypted with
3044
+ # the default Amazon S3 key (SSE-S3).
3074
3045
  #
3075
- # 1. Use the ARN for the KMS key ID. For example,
3076
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3046
+ # Note that the role making the request and the role specified in the
3047
+ # `DataAccessRoleArn` request parameter (if present) must have
3048
+ # permission to use the specified KMS key.
3077
3049
  #
3078
- # 2. Use the ARN for the KMS key alias. For example,
3079
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3080
3050
  #
3081
- # If you do not specify an encryption key, your output is encrypted with
3082
- # the default Amazon S3 key (SSE-S3).
3083
3051
  #
3084
- # Note that the role specified in the `DataAccessRoleArn` request
3085
- # parameter must have permission to use the specified KMS key.
3052
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
3086
3053
  #
3087
3054
  # @option params [Hash<String,String>] :kms_encryption_context
3088
3055
  # A map of plain text, non-secret key:value pairs, known as encryption
@@ -3382,43 +3349,24 @@ module Aws::TranscribeService
3382
3349
  # doesn't exist, one is created for you.
3383
3350
  #
3384
3351
  # @option params [String] :output_encryption_kms_key_id
3385
- # The KMS key you want to use to encrypt your medical transcription
3386
- # output.
3352
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
3353
+ # encrypt your medical transcription output.
3387
3354
  #
3388
- # If using a key located in the **current** Amazon Web Services account,
3389
- # you can specify your KMS key in one of four ways:
3390
- #
3391
- # 1. Use the KMS key ID itself. For example,
3392
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
3393
- #
3394
- # 2. Use an alias for the KMS key ID. For example,
3395
- # `alias/ExampleAlias`.
3396
- #
3397
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
3398
- # example,
3399
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3400
- #
3401
- # 4. Use the ARN for the KMS key alias. For example,
3402
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3403
- #
3404
- # If using a key located in a **different** Amazon Web Services account
3405
- # than the current Amazon Web Services account, you can specify your KMS
3406
- # key in one of two ways:
3407
- #
3408
- # 1. Use the ARN for the KMS key ID. For example,
3409
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3410
- #
3411
- # 2. Use the ARN for the KMS key alias. For example,
3412
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3355
+ # KMS key ARNs have the format
3356
+ # `arn:partition:kms:region:account:key/key-id`. For example:
3357
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3358
+ # For more information, see [ KMS key ARNs][1].
3413
3359
  #
3414
3360
  # If you do not specify an encryption key, your output is encrypted with
3415
3361
  # the default Amazon S3 key (SSE-S3).
3416
3362
  #
3417
- # If you specify a KMS key to encrypt your output, you must also specify
3418
- # an output location using the `OutputLocation` parameter.
3363
+ # Note that the role making the request and the role specified in the
3364
+ # `DataAccessRoleArn` request parameter (if present) must have
3365
+ # permission to use the specified KMS key.
3366
+ #
3367
+ #
3419
3368
  #
3420
- # Note that the role making the request must have permission to use the
3421
- # specified KMS key.
3369
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
3422
3370
  #
3423
3371
  # @option params [Hash<String,String>] :kms_encryption_context
3424
3372
  # A map of plain text, non-secret key:value pairs, known as encryption
@@ -3701,42 +3649,24 @@ module Aws::TranscribeService
3701
3649
  # doesn't exist, one is created for you.
3702
3650
  #
3703
3651
  # @option params [String] :output_encryption_kms_key_id
3704
- # The KMS key you want to use to encrypt your transcription output.
3652
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
3653
+ # encrypt your transcription output.
3705
3654
  #
3706
- # If using a key located in the **current** Amazon Web Services account,
3707
- # you can specify your KMS key in one of four ways:
3708
- #
3709
- # 1. Use the KMS key ID itself. For example,
3710
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
3711
- #
3712
- # 2. Use an alias for the KMS key ID. For example,
3713
- # `alias/ExampleAlias`.
3714
- #
3715
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
3716
- # example,
3717
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3718
- #
3719
- # 4. Use the ARN for the KMS key alias. For example,
3720
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3721
- #
3722
- # If using a key located in a **different** Amazon Web Services account
3723
- # than the current Amazon Web Services account, you can specify your KMS
3724
- # key in one of two ways:
3725
- #
3726
- # 1. Use the ARN for the KMS key ID. For example,
3727
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3728
- #
3729
- # 2. Use the ARN for the KMS key alias. For example,
3730
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
3655
+ # KMS key ARNs have the format
3656
+ # `arn:partition:kms:region:account:key/key-id`. For example:
3657
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
3658
+ # For more information, see [ KMS key ARNs][1].
3731
3659
  #
3732
3660
  # If you do not specify an encryption key, your output is encrypted with
3733
3661
  # the default Amazon S3 key (SSE-S3).
3734
3662
  #
3735
- # If you specify a KMS key to encrypt your output, you must also specify
3736
- # an output location using the `OutputLocation` parameter.
3663
+ # Note that the role making the request and the role specified in the
3664
+ # `DataAccessRoleArn` request parameter (if present) must have
3665
+ # permission to use the specified KMS key.
3666
+ #
3667
+ #
3737
3668
  #
3738
- # Note that the role making the request must have permission to use the
3739
- # specified KMS key.
3669
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
3740
3670
  #
3741
3671
  # @option params [Hash<String,String>] :kms_encryption_context
3742
3672
  # A map of plain text, non-secret key:value pairs, known as encryption
@@ -4584,7 +4514,7 @@ module Aws::TranscribeService
4584
4514
  tracer: tracer
4585
4515
  )
4586
4516
  context[:gem_name] = 'aws-sdk-transcribeservice'
4587
- context[:gem_version] = '1.129.0'
4517
+ context[:gem_version] = '1.130.0'
4588
4518
  Seahorse::Client::Request.new(handlers, context)
4589
4519
  end
4590
4520
 
@@ -13,22 +13,22 @@ module Aws::TranscribeService
13
13
  # @!attribute region
14
14
  # The AWS region used to dispatch the request.
15
15
  #
16
- # @return [String]
16
+ # @return [string]
17
17
  #
18
18
  # @!attribute use_dual_stack
19
19
  # When true, use the dual-stack endpoint. If the configured endpoint does not support dual-stack, dispatching the request MAY return an error.
20
20
  #
21
- # @return [Boolean]
21
+ # @return [boolean]
22
22
  #
23
23
  # @!attribute use_fips
24
24
  # When true, send this request to the FIPS-compliant regional endpoint. If the configured endpoint does not have a FIPS compliant endpoint, dispatching the request will return an error.
25
25
  #
26
- # @return [Boolean]
26
+ # @return [boolean]
27
27
  #
28
28
  # @!attribute endpoint
29
29
  # Override the endpoint used to send this request
30
30
  #
31
- # @return [String]
31
+ # @return [string]
32
32
  #
33
33
  EndpointParameters = Struct.new(
34
34
  :region,
@@ -4059,42 +4059,24 @@ module Aws::TranscribeService
4059
4059
  # @return [String]
4060
4060
  #
4061
4061
  # @!attribute [rw] output_encryption_kms_key_id
4062
- # The KMS key you want to use to encrypt your Call Analytics output.
4062
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4063
+ # encrypt your Call Analytics output.
4063
4064
  #
4064
- # If using a key located in the **current** Amazon Web Services
4065
- # account, you can specify your KMS key in one of four ways:
4066
- #
4067
- # 1. Use the KMS key ID itself. For example,
4068
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4069
- #
4070
- # 2. Use an alias for the KMS key ID. For example,
4071
- # `alias/ExampleAlias`.
4072
- #
4073
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4074
- # example,
4075
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4076
- #
4077
- # 4. Use the ARN for the KMS key alias. For example,
4078
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4079
- #
4080
- # If using a key located in a **different** Amazon Web Services
4081
- # account than the current Amazon Web Services account, you can
4082
- # specify your KMS key in one of two ways:
4083
- #
4084
- # 1. Use the ARN for the KMS key ID. For example,
4085
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4086
- #
4087
- # 2. Use the ARN for the KMS key alias. For example,
4088
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4065
+ # KMS key ARNs have the format
4066
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4067
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4068
+ # For more information, see [ KMS key ARNs][1].
4089
4069
  #
4090
4070
  # If you do not specify an encryption key, your output is encrypted
4091
4071
  # with the default Amazon S3 key (SSE-S3).
4092
4072
  #
4093
- # If you specify a KMS key to encrypt your output, you must also
4094
- # specify an output location using the `OutputLocation` parameter.
4073
+ # Note that the role making the request and the role specified in the
4074
+ # `DataAccessRoleArn` request parameter (if present) must have
4075
+ # permission to use the specified KMS key.
4076
+ #
4077
+ #
4095
4078
  #
4096
- # Note that the role making the request must have permission to use
4097
- # the specified KMS key.
4079
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4098
4080
  # @return [String]
4099
4081
  #
4100
4082
  # @!attribute [rw] data_access_role_arn
@@ -4209,39 +4191,24 @@ module Aws::TranscribeService
4209
4191
  # @return [String]
4210
4192
  #
4211
4193
  # @!attribute [rw] output_encryption_kms_key_id
4212
- # The KMS key you want to use to encrypt your Medical Scribe output.
4194
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4195
+ # encrypt your Medical Scribe output.
4213
4196
  #
4214
- # If using a key located in the **current** Amazon Web Services
4215
- # account, you can specify your KMS key in one of four ways:
4197
+ # KMS key ARNs have the format
4198
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4199
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4200
+ # For more information, see [ KMS key ARNs][1].
4216
4201
  #
4217
- # 1. Use the KMS key ID itself. For example,
4218
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4219
- #
4220
- # 2. Use an alias for the KMS key ID. For example,
4221
- # `alias/ExampleAlias`.
4222
- #
4223
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4224
- # example,
4225
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4226
- #
4227
- # 4. Use the ARN for the KMS key alias. For example,
4228
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4229
- #
4230
- # If using a key located in a **different** Amazon Web Services
4231
- # account than the current Amazon Web Services account, you can
4232
- # specify your KMS key in one of two ways:
4202
+ # If you do not specify an encryption key, your output is encrypted
4203
+ # with the default Amazon S3 key (SSE-S3).
4233
4204
  #
4234
- # 1. Use the ARN for the KMS key ID. For example,
4235
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4205
+ # Note that the role making the request and the role specified in the
4206
+ # `DataAccessRoleArn` request parameter (if present) must have
4207
+ # permission to use the specified KMS key.
4236
4208
  #
4237
- # 2. Use the ARN for the KMS key alias. For example,
4238
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4239
4209
  #
4240
- # If you do not specify an encryption key, your output is encrypted
4241
- # with the default Amazon S3 key (SSE-S3).
4242
4210
  #
4243
- # Note that the role specified in the `DataAccessRoleArn` request
4244
- # parameter must have permission to use the specified KMS key.
4211
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4245
4212
  # @return [String]
4246
4213
  #
4247
4214
  # @!attribute [rw] kms_encryption_context
@@ -4458,43 +4425,24 @@ module Aws::TranscribeService
4458
4425
  # @return [String]
4459
4426
  #
4460
4427
  # @!attribute [rw] output_encryption_kms_key_id
4461
- # The KMS key you want to use to encrypt your medical transcription
4462
- # output.
4428
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4429
+ # encrypt your medical transcription output.
4463
4430
  #
4464
- # If using a key located in the **current** Amazon Web Services
4465
- # account, you can specify your KMS key in one of four ways:
4466
- #
4467
- # 1. Use the KMS key ID itself. For example,
4468
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4469
- #
4470
- # 2. Use an alias for the KMS key ID. For example,
4471
- # `alias/ExampleAlias`.
4472
- #
4473
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4474
- # example,
4475
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4476
- #
4477
- # 4. Use the ARN for the KMS key alias. For example,
4478
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4479
- #
4480
- # If using a key located in a **different** Amazon Web Services
4481
- # account than the current Amazon Web Services account, you can
4482
- # specify your KMS key in one of two ways:
4483
- #
4484
- # 1. Use the ARN for the KMS key ID. For example,
4485
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4486
- #
4487
- # 2. Use the ARN for the KMS key alias. For example,
4488
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4431
+ # KMS key ARNs have the format
4432
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4433
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4434
+ # For more information, see [ KMS key ARNs][1].
4489
4435
  #
4490
4436
  # If you do not specify an encryption key, your output is encrypted
4491
4437
  # with the default Amazon S3 key (SSE-S3).
4492
4438
  #
4493
- # If you specify a KMS key to encrypt your output, you must also
4494
- # specify an output location using the `OutputLocation` parameter.
4439
+ # Note that the role making the request and the role specified in the
4440
+ # `DataAccessRoleArn` request parameter (if present) must have
4441
+ # permission to use the specified KMS key.
4442
+ #
4443
+ #
4495
4444
  #
4496
- # Note that the role making the request must have permission to use
4497
- # the specified KMS key.
4445
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4498
4446
  # @return [String]
4499
4447
  #
4500
4448
  # @!attribute [rw] kms_encryption_context
@@ -4718,42 +4666,24 @@ module Aws::TranscribeService
4718
4666
  # @return [String]
4719
4667
  #
4720
4668
  # @!attribute [rw] output_encryption_kms_key_id
4721
- # The KMS key you want to use to encrypt your transcription output.
4669
+ # The Amazon Resource Name (ARN) of a KMS key that you want to use to
4670
+ # encrypt your transcription output.
4722
4671
  #
4723
- # If using a key located in the **current** Amazon Web Services
4724
- # account, you can specify your KMS key in one of four ways:
4725
- #
4726
- # 1. Use the KMS key ID itself. For example,
4727
- # `1234abcd-12ab-34cd-56ef-1234567890ab`.
4728
- #
4729
- # 2. Use an alias for the KMS key ID. For example,
4730
- # `alias/ExampleAlias`.
4731
- #
4732
- # 3. Use the Amazon Resource Name (ARN) for the KMS key ID. For
4733
- # example,
4734
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4735
- #
4736
- # 4. Use the ARN for the KMS key alias. For example,
4737
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4738
- #
4739
- # If using a key located in a **different** Amazon Web Services
4740
- # account than the current Amazon Web Services account, you can
4741
- # specify your KMS key in one of two ways:
4742
- #
4743
- # 1. Use the ARN for the KMS key ID. For example,
4744
- # `arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4745
- #
4746
- # 2. Use the ARN for the KMS key alias. For example,
4747
- # `arn:aws:kms:region:account-ID:alias/ExampleAlias`.
4672
+ # KMS key ARNs have the format
4673
+ # `arn:partition:kms:region:account:key/key-id`. For example:
4674
+ # `arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`.
4675
+ # For more information, see [ KMS key ARNs][1].
4748
4676
  #
4749
4677
  # If you do not specify an encryption key, your output is encrypted
4750
4678
  # with the default Amazon S3 key (SSE-S3).
4751
4679
  #
4752
- # If you specify a KMS key to encrypt your output, you must also
4753
- # specify an output location using the `OutputLocation` parameter.
4680
+ # Note that the role making the request and the role specified in the
4681
+ # `DataAccessRoleArn` request parameter (if present) must have
4682
+ # permission to use the specified KMS key.
4683
+ #
4684
+ #
4754
4685
  #
4755
- # Note that the role making the request must have permission to use
4756
- # the specified KMS key.
4686
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN
4757
4687
  # @return [String]
4758
4688
  #
4759
4689
  # @!attribute [rw] kms_encryption_context
@@ -54,7 +54,7 @@ module Aws::TranscribeService
54
54
  autoload :EndpointProvider, 'aws-sdk-transcribeservice/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-transcribeservice/endpoints'
56
56
 
57
- GEM_VERSION = '1.129.0'
57
+ GEM_VERSION = '1.130.0'
58
58
 
59
59
  end
60
60
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-transcribeservice
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.129.0
4
+ version: 1.130.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services