|
423 | 423 | "members":{
|
424 | 424 | "Type":{
|
425 | 425 | "shape":"EncryptionKeyType",
|
426 |
| - "documentation":"<p>The type of encryption key used by Amazon Translate to encrypt custom terminologies.</p>" |
| 426 | + "documentation":"<p>The type of encryption key used by Amazon Translate to encrypt this object.</p>" |
427 | 427 | },
|
428 | 428 | "Id":{
|
429 | 429 | "shape":"EncryptionKeyID",
|
430 |
| - "documentation":"<p>The Amazon Resource Name (ARN) of the encryption key being used to encrypt the custom terminology.</p>" |
| 430 | + "documentation":"<p>The Amazon Resource Name (ARN) of the encryption key being used to encrypt this object.</p>" |
431 | 431 | }
|
432 | 432 | },
|
433 | 433 | "documentation":"<p>The encryption key used to encrypt this object.</p>"
|
|
461 | 461 | },
|
462 | 462 | "DataLocation":{
|
463 | 463 | "shape":"ParallelDataDataLocation",
|
464 |
| - "documentation":"<p>The Amazon S3 location of the most recent parallel data input file that was successfully imported into Amazon Translate. The location is returned as a presigned URL that has a 30 minute expiration.</p> <important> <p>Amazon Translate doesn't scan parallel data input files for the risk of CSV injection attacks. </p> <p>CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.</p> <p>Before you download a parallel data input file from Amazon S3, ensure that you recognize the file and trust its creator.</p> </important>" |
| 464 | + "documentation":"<p>The Amazon S3 location of the most recent parallel data input file that was successfully imported into Amazon Translate. The location is returned as a presigned URL that has a 30 minute expiration.</p> <important> <p>Amazon Translate doesn't scan all input files for the risk of CSV injection attacks. </p> <p>CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.</p> <p>Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.</p> </important>" |
465 | 465 | },
|
466 | 466 | "AuxiliaryDataLocation":{
|
467 | 467 | "shape":"ParallelDataDataLocation",
|
|
496 | 496 | },
|
497 | 497 | "TerminologyDataLocation":{
|
498 | 498 | "shape":"TerminologyDataLocation",
|
499 |
| - "documentation":"<p>The data location of the custom terminology being retrieved. The custom terminology file is returned in a presigned url that has a 30 minute expiration.</p>" |
| 499 | + "documentation":"<p>The Amazon S3 location of the most recent custom terminology input file that was successfully imported into Amazon Translate. The location is returned as a presigned URL that has a 30 minute expiration.</p> <important> <p>Amazon Translate doesn't scan all input files for the risk of CSV injection attacks. </p> <p>CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.</p> <p>Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.</p> </important>" |
500 | 500 | },
|
501 | 501 | "AuxiliaryDataLocation":{
|
502 | 502 | "shape":"TerminologyDataLocation",
|
|
809 | 809 | },
|
810 | 810 | "Location":{
|
811 | 811 | "shape":"String",
|
812 |
| - "documentation":"<p>The Amazon S3 location of the parallel data input file. The location is returned as a presigned URL to that has a 30 minute expiration.</p> <important> <p>Amazon Translate doesn't scan parallel data input files for the risk of CSV injection attacks. </p> <p>CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.</p> <p>Before you download a parallel data input file from Amazon S3, ensure that you recognize the file and trust its creator.</p> </important>" |
| 812 | + "documentation":"<p>The Amazon S3 location of the parallel data input file. The location is returned as a presigned URL to that has a 30 minute expiration.</p> <important> <p>Amazon Translate doesn't scan all input files for the risk of CSV injection attacks. </p> <p>CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.</p> <p>Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.</p> </important>" |
813 | 813 | }
|
814 | 814 | },
|
815 | 815 | "documentation":"<p>The location of the most recent parallel data input file that was successfully imported into Amazon Translate.</p>"
|
|
907 | 907 | "FAILED"
|
908 | 908 | ]
|
909 | 909 | },
|
| 910 | + "Profanity":{ |
| 911 | + "type":"string", |
| 912 | + "enum":["MASK"] |
| 913 | + }, |
910 | 914 | "ResourceName":{
|
911 | 915 | "type":"string",
|
912 | 916 | "max":256,
|
|
986 | 990 | "shape":"ClientTokenString",
|
987 | 991 | "documentation":"<p>A unique identifier for the request. This token is auto-generated when using the Amazon Translate SDK.</p>",
|
988 | 992 | "idempotencyToken":true
|
| 993 | + }, |
| 994 | + "Settings":{ |
| 995 | + "shape":"TranslationSettings", |
| 996 | + "documentation":"<p>Settings to configure your translation output, including the option to mask profane words and phrases.</p>" |
989 | 997 | }
|
990 | 998 | }
|
991 | 999 | },
|
|
1102 | 1110 | },
|
1103 | 1111 | "Location":{
|
1104 | 1112 | "shape":"String",
|
1105 |
| - "documentation":"<p>The location of the custom terminology data.</p>" |
| 1113 | + "documentation":"<p>The Amazon S3 location of the most recent custom terminology input file that was successfully imported into Amazon Translate. The location is returned as a presigned URL that has a 30 minute expiration.</p> <important> <p>Amazon Translate doesn't scan all input files for the risk of CSV injection attacks. </p> <p>CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.</p> <p>Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.</p> </important>" |
1106 | 1114 | }
|
1107 | 1115 | },
|
1108 | 1116 | "documentation":"<p>The location of the custom terminology data.</p>"
|
|
1266 | 1274 | "DataAccessRoleArn":{
|
1267 | 1275 | "shape":"IamRoleArn",
|
1268 | 1276 | "documentation":"<p>The Amazon Resource Name (ARN) of an AWS Identity Access and Management (IAM) role that granted Amazon Translate read access to the job's input data.</p>"
|
| 1277 | + }, |
| 1278 | + "Settings":{ |
| 1279 | + "shape":"TranslationSettings", |
| 1280 | + "documentation":"<p>Settings that configure the translation output.</p>" |
1269 | 1281 | }
|
1270 | 1282 | },
|
1271 | 1283 | "documentation":"<p>Provides information about a translation job.</p>"
|
|
1306 | 1318 | "TargetLanguageCode":{
|
1307 | 1319 | "shape":"LanguageCodeString",
|
1308 | 1320 | "documentation":"<p>The language code requested for the language of the target text. The language must be a language supported by Amazon Translate.</p>"
|
| 1321 | + }, |
| 1322 | + "Settings":{ |
| 1323 | + "shape":"TranslationSettings", |
| 1324 | + "documentation":"<p>Settings to configure your translation output, including the option to mask profane words and phrases.</p>" |
1309 | 1325 | }
|
1310 | 1326 | }
|
1311 | 1327 | },
|
|
1332 | 1348 | "AppliedTerminologies":{
|
1333 | 1349 | "shape":"AppliedTerminologyList",
|
1334 | 1350 | "documentation":"<p>The names of the custom terminologies applied to the input text by Amazon Translate for the translated text response.</p>"
|
| 1351 | + }, |
| 1352 | + "AppliedSettings":{ |
| 1353 | + "shape":"TranslationSettings", |
| 1354 | + "documentation":"<p>Settings that configure the translation output.</p>" |
1335 | 1355 | }
|
1336 | 1356 | }
|
1337 | 1357 | },
|
| 1358 | + "TranslationSettings":{ |
| 1359 | + "type":"structure", |
| 1360 | + "members":{ |
| 1361 | + "Profanity":{ |
| 1362 | + "shape":"Profanity", |
| 1363 | + "documentation":"<p>Enable the profanity setting if you want Amazon Translate to mask profane words and phrases in your translation output.</p> <p>To mask profane words and phrases, Amazon Translate replaces them with the grawlix string “?$#@$“. This 5-character sequence is used for each profane word or phrase, regardless of the length or number of words.</p> <p>Amazon Translate does not detect profanity in all of its supported languages. For languages that support profanity detection, see <a href=\"https://docs.aws.amazon.com/translate/latest/dg/what-is.html#what-is-languages\">Supported Languages and Language Codes in the Amazon Translate Developer Guide</a>.</p>" |
| 1364 | + } |
| 1365 | + }, |
| 1366 | + "documentation":"<p>Settings that configure the translation output.</p>" |
| 1367 | + }, |
1338 | 1368 | "UnboundedLengthString":{"type":"string"},
|
1339 | 1369 | "UnsupportedLanguagePairException":{
|
1340 | 1370 | "type":"structure",
|
|
0 commit comments