@aws-sdk/client-transcribe 3.863.0 → 3.864.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4464,49 +4464,17 @@ export interface StartCallAnalyticsJobRequest {
4464
4464
  */
4465
4465
  OutputLocation?: string | undefined;
4466
4466
  /**
4467
- * <p>The KMS key you want to use to encrypt your Call Analytics
4468
- * output.</p>
4469
- * <p>If using a key located in the <b>current</b>
4470
- * Amazon Web Services account, you can specify your KMS key in one of four
4471
- * ways:</p>
4472
- * <ol>
4473
- * <li>
4474
- * <p>Use the KMS key ID itself. For example,
4475
- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4476
- * </li>
4477
- * <li>
4478
- * <p>Use an alias for the KMS key ID. For example,
4479
- * <code>alias/ExampleAlias</code>.</p>
4480
- * </li>
4481
- * <li>
4482
- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
4483
- * example,
4484
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4485
- * </li>
4486
- * <li>
4487
- * <p>Use the ARN for the KMS key alias. For example,
4488
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
4489
- * </li>
4490
- * </ol>
4491
- * <p>If using a key located in a <b>different</b>
4492
- * Amazon Web Services account than the current Amazon Web Services account, you can specify
4493
- * your KMS key in one of two ways:</p>
4494
- * <ol>
4495
- * <li>
4496
- * <p>Use the ARN for the KMS key ID. For example,
4497
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4498
- * </li>
4499
- * <li>
4500
- * <p>Use the ARN for the KMS key alias. For example,
4501
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
4502
- * </li>
4503
- * </ol>
4467
+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
4468
+ * encrypt your Call Analytics output.</p>
4469
+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
4470
+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
4471
+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
4472
+ * KMS key ARNs</a>.</p>
4504
4473
  * <p>If you do not specify an encryption key, your output is encrypted with the default
4505
- * Amazon S3 key (SSE-S3).</p>
4506
- * <p>If you specify a KMS key to encrypt your output, you must also specify
4507
- * an output location using the <code>OutputLocation</code> parameter.</p>
4508
- * <p>Note that the role making the request must
4509
- * have permission to use the specified KMS key.</p>
4474
+ * Amazon S3 key (SSE-S3).</p>
4475
+ * <p>Note that the role making the request and the role specified in
4476
+ * the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
4477
+ * specified KMS key.</p>
4510
4478
  * @public
4511
4479
  */
4512
4480
  OutputEncryptionKMSKeyId?: string | undefined;
@@ -4588,47 +4556,17 @@ export interface StartMedicalScribeJobRequest {
4588
4556
  */
4589
4557
  OutputBucketName: string | undefined;
4590
4558
  /**
4591
- * <p>The KMS key you want to use to encrypt your Medical Scribe
4592
- * output.</p>
4593
- * <p>If using a key located in the <b>current</b>
4594
- * Amazon Web Services account, you can specify your KMS key in one of four
4595
- * ways:</p>
4596
- * <ol>
4597
- * <li>
4598
- * <p>Use the KMS key ID itself. For example,
4599
- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4600
- * </li>
4601
- * <li>
4602
- * <p>Use an alias for the KMS key ID. For example,
4603
- * <code>alias/ExampleAlias</code>.</p>
4604
- * </li>
4605
- * <li>
4606
- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
4607
- * example,
4608
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4609
- * </li>
4610
- * <li>
4611
- * <p>Use the ARN for the KMS key alias. For example,
4612
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
4613
- * </li>
4614
- * </ol>
4615
- * <p>If using a key located in a <b>different</b>
4616
- * Amazon Web Services account than the current Amazon Web Services account, you can specify
4617
- * your KMS key in one of two ways:</p>
4618
- * <ol>
4619
- * <li>
4620
- * <p>Use the ARN for the KMS key ID. For example,
4621
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4622
- * </li>
4623
- * <li>
4624
- * <p>Use the ARN for the KMS key alias. For example,
4625
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
4626
- * </li>
4627
- * </ol>
4559
+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
4560
+ * encrypt your Medical Scribe output.</p>
4561
+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
4562
+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
4563
+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
4564
+ * KMS key ARNs</a>.</p>
4628
4565
  * <p>If you do not specify an encryption key, your output is encrypted with the default
4629
4566
  * Amazon S3 key (SSE-S3).</p>
4630
- * <p>Note that the role specified in the <code>DataAccessRoleArn</code> request parameter
4631
- * must have permission to use the specified KMS key.</p>
4567
+ * <p>Note that the role making the request and the role specified in
4568
+ * the <code>DataAccessRoleArn</code> request parameter (if present)
4569
+ * must have permission to use the specified KMS key.</p>
4632
4570
  * @public
4633
4571
  */
4634
4572
  OutputEncryptionKMSKeyId?: string | undefined;
@@ -4797,49 +4735,17 @@ export interface StartMedicalTranscriptionJobRequest {
4797
4735
  */
4798
4736
  OutputKey?: string | undefined;
4799
4737
  /**
4800
- * <p>The KMS key you want to use to encrypt your medical transcription
4801
- * output.</p>
4802
- * <p>If using a key located in the <b>current</b>
4803
- * Amazon Web Services account, you can specify your KMS key in one of four
4804
- * ways:</p>
4805
- * <ol>
4806
- * <li>
4807
- * <p>Use the KMS key ID itself. For example,
4808
- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4809
- * </li>
4810
- * <li>
4811
- * <p>Use an alias for the KMS key ID. For example,
4812
- * <code>alias/ExampleAlias</code>.</p>
4813
- * </li>
4814
- * <li>
4815
- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
4816
- * example,
4817
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4818
- * </li>
4819
- * <li>
4820
- * <p>Use the ARN for the KMS key alias. For example,
4821
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
4822
- * </li>
4823
- * </ol>
4824
- * <p>If using a key located in a <b>different</b>
4825
- * Amazon Web Services account than the current Amazon Web Services account, you can specify
4826
- * your KMS key in one of two ways:</p>
4827
- * <ol>
4828
- * <li>
4829
- * <p>Use the ARN for the KMS key ID. For example,
4830
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4831
- * </li>
4832
- * <li>
4833
- * <p>Use the ARN for the KMS key alias. For example,
4834
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
4835
- * </li>
4836
- * </ol>
4738
+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
4739
+ * encrypt your medical transcription output.</p>
4740
+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
4741
+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
4742
+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
4743
+ * KMS key ARNs</a>.</p>
4837
4744
  * <p>If you do not specify an encryption key, your output is encrypted with the default
4838
- * Amazon S3 key (SSE-S3).</p>
4839
- * <p>If you specify a KMS key to encrypt your output, you must also specify
4840
- * an output location using the <code>OutputLocation</code> parameter.</p>
4841
- * <p>Note that the role making the request must
4842
- * have permission to use the specified KMS key.</p>
4745
+ * Amazon S3 key (SSE-S3).</p>
4746
+ * <p>Note that the role making the request and the role specified
4747
+ * in the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
4748
+ * specified KMS key.</p>
4843
4749
  * @public
4844
4750
  */
4845
4751
  OutputEncryptionKMSKeyId?: string | undefined;
@@ -5035,49 +4941,17 @@ export interface StartTranscriptionJobRequest {
5035
4941
  */
5036
4942
  OutputKey?: string | undefined;
5037
4943
  /**
5038
- * <p>The KMS key you want to use to encrypt your transcription
5039
- * output.</p>
5040
- * <p>If using a key located in the <b>current</b>
5041
- * Amazon Web Services account, you can specify your KMS key in one of four
5042
- * ways:</p>
5043
- * <ol>
5044
- * <li>
5045
- * <p>Use the KMS key ID itself. For example,
5046
- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5047
- * </li>
5048
- * <li>
5049
- * <p>Use an alias for the KMS key ID. For example,
5050
- * <code>alias/ExampleAlias</code>.</p>
5051
- * </li>
5052
- * <li>
5053
- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5054
- * example,
5055
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5056
- * </li>
5057
- * <li>
5058
- * <p>Use the ARN for the KMS key alias. For example,
5059
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5060
- * </li>
5061
- * </ol>
5062
- * <p>If using a key located in a <b>different</b>
5063
- * Amazon Web Services account than the current Amazon Web Services account, you can specify
5064
- * your KMS key in one of two ways:</p>
5065
- * <ol>
5066
- * <li>
5067
- * <p>Use the ARN for the KMS key ID. For example,
5068
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5069
- * </li>
5070
- * <li>
5071
- * <p>Use the ARN for the KMS key alias. For example,
5072
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5073
- * </li>
5074
- * </ol>
4944
+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
4945
+ * encrypt your transcription output.</p>
4946
+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
4947
+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
4948
+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
4949
+ * KMS key ARNs</a>.</p>
5075
4950
  * <p>If you do not specify an encryption key, your output is encrypted with the default
5076
- * Amazon S3 key (SSE-S3).</p>
5077
- * <p>If you specify a KMS key to encrypt your output, you must also specify
5078
- * an output location using the <code>OutputLocation</code> parameter.</p>
5079
- * <p>Note that the role making the request must
5080
- * have permission to use the specified KMS key.</p>
4951
+ * Amazon S3 key (SSE-S3).</p>
4952
+ * <p>Note that the role making the request and the role specified in the
4953
+ * <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the specified
4954
+ * KMS key.</p>
5081
4955
  * @public
5082
4956
  */
5083
4957
  OutputEncryptionKMSKeyId?: string | undefined;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-transcribe",
3
3
  "description": "AWS SDK for JavaScript Transcribe Client for Node.js, Browser and React Native",
4
- "version": "3.863.0",
4
+ "version": "3.864.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-transcribe",
@@ -20,17 +20,17 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "5.2.0",
22
22
  "@aws-crypto/sha256-js": "5.2.0",
23
- "@aws-sdk/core": "3.863.0",
24
- "@aws-sdk/credential-provider-node": "3.863.0",
23
+ "@aws-sdk/core": "3.864.0",
24
+ "@aws-sdk/credential-provider-node": "3.864.0",
25
25
  "@aws-sdk/middleware-host-header": "3.862.0",
26
26
  "@aws-sdk/middleware-logger": "3.862.0",
27
27
  "@aws-sdk/middleware-recursion-detection": "3.862.0",
28
- "@aws-sdk/middleware-user-agent": "3.863.0",
28
+ "@aws-sdk/middleware-user-agent": "3.864.0",
29
29
  "@aws-sdk/region-config-resolver": "3.862.0",
30
30
  "@aws-sdk/types": "3.862.0",
31
31
  "@aws-sdk/util-endpoints": "3.862.0",
32
32
  "@aws-sdk/util-user-agent-browser": "3.862.0",
33
- "@aws-sdk/util-user-agent-node": "3.863.0",
33
+ "@aws-sdk/util-user-agent-node": "3.864.0",
34
34
  "@smithy/config-resolver": "^4.1.5",
35
35
  "@smithy/core": "^3.8.0",
36
36
  "@smithy/fetch-http-handler": "^5.1.1",