Skip to content

Commit eefe247

Browse files
author
awstools
committed
feat(client-transcribe): Move UntagResource API body member to query parameter
1 parent 69c1ccd commit eefe247

File tree

3 files changed

+50
-175
lines changed

3 files changed

+50
-175
lines changed

clients/client-transcribe/src/endpoint/ruleset.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ e="endpoint",
1818
f="tree",
1919
g="PartitionResult",
2020
h="stringEquals",
21-
i={[w]:false,"type":"String"},
22-
j={[w]:true,"default":false,"type":"Boolean"},
21+
i={[w]:false,"type":"string"},
22+
j={[w]:true,"default":false,"type":"boolean"},
2323
k={[z]:"Endpoint"},
2424
l={[x]:c,[y]:[{[z]:"UseFIPS"},true]},
2525
m={[x]:c,[y]:[{[z]:"UseDualStack"},true]},

clients/client-transcribe/src/models/models_0.ts

Lines changed: 39 additions & 165 deletions
Original file line numberDiff line numberDiff line change
@@ -5010,49 +5010,17 @@ export interface StartCallAnalyticsJobRequest {
50105010
OutputLocation?: string | undefined;
50115011

50125012
/**
5013-
* <p>The KMS key you want to use to encrypt your Call Analytics
5014-
* output.</p>
5015-
* <p>If using a key located in the <b>current</b>
5016-
* Amazon Web Services account, you can specify your KMS key in one of four
5017-
* ways:</p>
5018-
* <ol>
5019-
* <li>
5020-
* <p>Use the KMS key ID itself. For example,
5021-
* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5022-
* </li>
5023-
* <li>
5024-
* <p>Use an alias for the KMS key ID. For example,
5025-
* <code>alias/ExampleAlias</code>.</p>
5026-
* </li>
5027-
* <li>
5028-
* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5029-
* example,
5030-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5031-
* </li>
5032-
* <li>
5033-
* <p>Use the ARN for the KMS key alias. For example,
5034-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5035-
* </li>
5036-
* </ol>
5037-
* <p>If using a key located in a <b>different</b>
5038-
* Amazon Web Services account than the current Amazon Web Services account, you can specify
5039-
* your KMS key in one of two ways:</p>
5040-
* <ol>
5041-
* <li>
5042-
* <p>Use the ARN for the KMS key ID. For example,
5043-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5044-
* </li>
5045-
* <li>
5046-
* <p>Use the ARN for the KMS key alias. For example,
5047-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5048-
* </li>
5049-
* </ol>
5013+
* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5014+
* encrypt your Call Analytics output.</p>
5015+
* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5016+
* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5017+
* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5018+
* KMS key ARNs</a>.</p>
50505019
* <p>If you do not specify an encryption key, your output is encrypted with the default
5051-
* Amazon S3 key (SSE-S3).</p>
5052-
* <p>If you specify a KMS key to encrypt your output, you must also specify
5053-
* an output location using the <code>OutputLocation</code> parameter.</p>
5054-
* <p>Note that the role making the request must
5055-
* have permission to use the specified KMS key.</p>
5020+
* Amazon S3 key (SSE-S3).</p>
5021+
* <p>Note that the role making the request and the role specified in
5022+
* the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
5023+
* specified KMS key.</p>
50565024
* @public
50575025
*/
50585026
OutputEncryptionKMSKeyId?: string | undefined;
@@ -5143,47 +5111,17 @@ export interface StartMedicalScribeJobRequest {
51435111
OutputBucketName: string | undefined;
51445112

51455113
/**
5146-
* <p>The KMS key you want to use to encrypt your Medical Scribe
5147-
* output.</p>
5148-
* <p>If using a key located in the <b>current</b>
5149-
* Amazon Web Services account, you can specify your KMS key in one of four
5150-
* ways:</p>
5151-
* <ol>
5152-
* <li>
5153-
* <p>Use the KMS key ID itself. For example,
5154-
* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5155-
* </li>
5156-
* <li>
5157-
* <p>Use an alias for the KMS key ID. For example,
5158-
* <code>alias/ExampleAlias</code>.</p>
5159-
* </li>
5160-
* <li>
5161-
* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5162-
* example,
5163-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5164-
* </li>
5165-
* <li>
5166-
* <p>Use the ARN for the KMS key alias. For example,
5167-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5168-
* </li>
5169-
* </ol>
5170-
* <p>If using a key located in a <b>different</b>
5171-
* Amazon Web Services account than the current Amazon Web Services account, you can specify
5172-
* your KMS key in one of two ways:</p>
5173-
* <ol>
5174-
* <li>
5175-
* <p>Use the ARN for the KMS key ID. For example,
5176-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5177-
* </li>
5178-
* <li>
5179-
* <p>Use the ARN for the KMS key alias. For example,
5180-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5181-
* </li>
5182-
* </ol>
5114+
* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5115+
* encrypt your Medical Scribe output.</p>
5116+
* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5117+
* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5118+
* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5119+
* KMS key ARNs</a>.</p>
51835120
* <p>If you do not specify an encryption key, your output is encrypted with the default
51845121
* Amazon S3 key (SSE-S3).</p>
5185-
* <p>Note that the role specified in the <code>DataAccessRoleArn</code> request parameter
5186-
* must have permission to use the specified KMS key.</p>
5122+
* <p>Note that the role making the request and the role specified in
5123+
* the <code>DataAccessRoleArn</code> request parameter (if present)
5124+
* must have permission to use the specified KMS key.</p>
51875125
* @public
51885126
*/
51895127
OutputEncryptionKMSKeyId?: string | undefined;
@@ -5373,49 +5311,17 @@ export interface StartMedicalTranscriptionJobRequest {
53735311
OutputKey?: string | undefined;
53745312

53755313
/**
5376-
* <p>The KMS key you want to use to encrypt your medical transcription
5377-
* output.</p>
5378-
* <p>If using a key located in the <b>current</b>
5379-
* Amazon Web Services account, you can specify your KMS key in one of four
5380-
* ways:</p>
5381-
* <ol>
5382-
* <li>
5383-
* <p>Use the KMS key ID itself. For example,
5384-
* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5385-
* </li>
5386-
* <li>
5387-
* <p>Use an alias for the KMS key ID. For example,
5388-
* <code>alias/ExampleAlias</code>.</p>
5389-
* </li>
5390-
* <li>
5391-
* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5392-
* example,
5393-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5394-
* </li>
5395-
* <li>
5396-
* <p>Use the ARN for the KMS key alias. For example,
5397-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5398-
* </li>
5399-
* </ol>
5400-
* <p>If using a key located in a <b>different</b>
5401-
* Amazon Web Services account than the current Amazon Web Services account, you can specify
5402-
* your KMS key in one of two ways:</p>
5403-
* <ol>
5404-
* <li>
5405-
* <p>Use the ARN for the KMS key ID. For example,
5406-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5407-
* </li>
5408-
* <li>
5409-
* <p>Use the ARN for the KMS key alias. For example,
5410-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5411-
* </li>
5412-
* </ol>
5314+
* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5315+
* encrypt your medical transcription output.</p>
5316+
* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5317+
* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5318+
* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5319+
* KMS key ARNs</a>.</p>
54135320
* <p>If you do not specify an encryption key, your output is encrypted with the default
5414-
* Amazon S3 key (SSE-S3).</p>
5415-
* <p>If you specify a KMS key to encrypt your output, you must also specify
5416-
* an output location using the <code>OutputLocation</code> parameter.</p>
5417-
* <p>Note that the role making the request must
5418-
* have permission to use the specified KMS key.</p>
5321+
* Amazon S3 key (SSE-S3).</p>
5322+
* <p>Note that the role making the request and the role specified
5323+
* in the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
5324+
* specified KMS key.</p>
54195325
* @public
54205326
*/
54215327
OutputEncryptionKMSKeyId?: string | undefined;
@@ -5628,49 +5534,17 @@ export interface StartTranscriptionJobRequest {
56285534
OutputKey?: string | undefined;
56295535

56305536
/**
5631-
* <p>The KMS key you want to use to encrypt your transcription
5632-
* output.</p>
5633-
* <p>If using a key located in the <b>current</b>
5634-
* Amazon Web Services account, you can specify your KMS key in one of four
5635-
* ways:</p>
5636-
* <ol>
5637-
* <li>
5638-
* <p>Use the KMS key ID itself. For example,
5639-
* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5640-
* </li>
5641-
* <li>
5642-
* <p>Use an alias for the KMS key ID. For example,
5643-
* <code>alias/ExampleAlias</code>.</p>
5644-
* </li>
5645-
* <li>
5646-
* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5647-
* example,
5648-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5649-
* </li>
5650-
* <li>
5651-
* <p>Use the ARN for the KMS key alias. For example,
5652-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5653-
* </li>
5654-
* </ol>
5655-
* <p>If using a key located in a <b>different</b>
5656-
* Amazon Web Services account than the current Amazon Web Services account, you can specify
5657-
* your KMS key in one of two ways:</p>
5658-
* <ol>
5659-
* <li>
5660-
* <p>Use the ARN for the KMS key ID. For example,
5661-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5662-
* </li>
5663-
* <li>
5664-
* <p>Use the ARN for the KMS key alias. For example,
5665-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5666-
* </li>
5667-
* </ol>
5537+
* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5538+
* encrypt your transcription output.</p>
5539+
* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5540+
* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5541+
* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5542+
* KMS key ARNs</a>.</p>
56685543
* <p>If you do not specify an encryption key, your output is encrypted with the default
5669-
* Amazon S3 key (SSE-S3).</p>
5670-
* <p>If you specify a KMS key to encrypt your output, you must also specify
5671-
* an output location using the <code>OutputLocation</code> parameter.</p>
5672-
* <p>Note that the role making the request must
5673-
* have permission to use the specified KMS key.</p>
5544+
* Amazon S3 key (SSE-S3).</p>
5545+
* <p>Note that the role making the request and the role specified in the
5546+
* <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the specified
5547+
* KMS key.</p>
56745548
* @public
56755549
*/
56765550
OutputEncryptionKMSKeyId?: string | undefined;

0 commit comments

Comments
 (0)