diff --git a/clients/client-chime-sdk-media-pipelines/src/commands/CreateMediaCapturePipelineCommand.ts b/clients/client-chime-sdk-media-pipelines/src/commands/CreateMediaCapturePipelineCommand.ts index 2b0b397a27ed..7a6f5290f9e8 100644 --- a/clients/client-chime-sdk-media-pipelines/src/commands/CreateMediaCapturePipelineCommand.ts +++ b/clients/client-chime-sdk-media-pipelines/src/commands/CreateMediaCapturePipelineCommand.ts @@ -107,6 +107,11 @@ export interface CreateMediaCapturePipelineCommandOutput extends CreateMediaCapt * }, * }, * }, + * SseAwsKeyManagementParams: { // SseAwsKeyManagementParams + * AwsKmsKeyId: "STRING_VALUE", // required + * AwsKmsEncryptionContext: "STRING_VALUE", + * }, + * SinkIamRoleArn: "STRING_VALUE", * Tags: [ // TagList * { // Tag * Key: "STRING_VALUE", // required @@ -184,6 +189,11 @@ export interface CreateMediaCapturePipelineCommandOutput extends CreateMediaCapt * // }, * // }, * // }, + * // SseAwsKeyManagementParams: { // SseAwsKeyManagementParams + * // AwsKmsKeyId: "STRING_VALUE", // required + * // AwsKmsEncryptionContext: "STRING_VALUE", + * // }, + * // SinkIamRoleArn: "STRING_VALUE", * // }, * // }; * diff --git a/clients/client-chime-sdk-media-pipelines/src/commands/GetMediaCapturePipelineCommand.ts b/clients/client-chime-sdk-media-pipelines/src/commands/GetMediaCapturePipelineCommand.ts index 8991ded90667..e844d428067b 100644 --- a/clients/client-chime-sdk-media-pipelines/src/commands/GetMediaCapturePipelineCommand.ts +++ b/clients/client-chime-sdk-media-pipelines/src/commands/GetMediaCapturePipelineCommand.ts @@ -116,6 +116,11 @@ export interface GetMediaCapturePipelineCommandOutput extends GetMediaCapturePip * // }, * // }, * // }, + * // SseAwsKeyManagementParams: { // SseAwsKeyManagementParams + * // AwsKmsKeyId: "STRING_VALUE", // required + * // AwsKmsEncryptionContext: "STRING_VALUE", + * // }, + * // SinkIamRoleArn: "STRING_VALUE", * // }, * // }; * diff --git a/clients/client-chime-sdk-media-pipelines/src/commands/GetMediaPipelineCommand.ts b/clients/client-chime-sdk-media-pipelines/src/commands/GetMediaPipelineCommand.ts index 0d2b3754f100..2760f8b19442 100644 --- a/clients/client-chime-sdk-media-pipelines/src/commands/GetMediaPipelineCommand.ts +++ b/clients/client-chime-sdk-media-pipelines/src/commands/GetMediaPipelineCommand.ts @@ -117,6 +117,11 @@ export interface GetMediaPipelineCommandOutput extends GetMediaPipelineResponse, * // }, * // }, * // }, + * // SseAwsKeyManagementParams: { // SseAwsKeyManagementParams + * // AwsKmsKeyId: "STRING_VALUE", // required + * // AwsKmsEncryptionContext: "STRING_VALUE", + * // }, + * // SinkIamRoleArn: "STRING_VALUE", * // }, * // MediaLiveConnectorPipeline: { // MediaLiveConnectorPipeline * // Sources: [ // LiveConnectorSourceList diff --git a/clients/client-chime-sdk-media-pipelines/src/models/models_0.ts b/clients/client-chime-sdk-media-pipelines/src/models/models_0.ts index 0f7d9aa6c592..873ee9ed8bff 100644 --- a/clients/client-chime-sdk-media-pipelines/src/models/models_0.ts +++ b/clients/client-chime-sdk-media-pipelines/src/models/models_0.ts @@ -392,6 +392,10 @@ export interface AmazonTranscribeProcessorConfiguration { /** *
Turns language identification on or off for multiple languages.
+ *Calls to this API must include a LanguageCode
, IdentifyLanguage
, or IdentifyMultipleLanguages
parameter.
+ * If you include more than one of those parameters, your transcription job fails.
Contains server side encryption parameters to be used by media capture pipeline. The + * parameters can also be used by media concatenation pipeline taking media capture pipeline + * as a media source.
+ * @public + */ +export interface SseAwsKeyManagementParams { + /** + *The KMS key you want to use to encrypt your media pipeline output. + * Decryption is required for concatenation pipeline. If using a key located in the current + * Amazon Web Services account, you can specify your KMS key in one of four + * ways:
+ *Use the KMS key ID itself. For example,
+ * 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an alias for the KMS key ID. For example,
+ * alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For example,
+ * arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
+ * arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than the current + * Amazon Web Services account, you can specify your KMS key in one of two + * ways:
+ *Use the ARN for the KMS key ID. For example,
+ * arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
+ * arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If you don't specify an encryption key, your output is encrypted with the default + * Amazon S3 key (SSE-S3).
+ *Note that the role specified in the SinkIamRoleArn
request parameter must
+ * have permission to use the specified KMS key.
Base64-encoded string of a UTF-8 encoded JSON, which contains the encryption context as + * non-secret key-value pair known as encryption context pairs, that provides an added layer + * of security for your data. For more information, see KMS encryption + * context and Asymmetric keys in KMS in the Key Management Service Developer + * Guide.
+ * @public + */ + AwsKmsEncryptionContext?: string; +} + /** *A key/value pair that grants users access to meeting resources.
* @public @@ -1274,6 +1340,28 @@ export interface CreateMediaCapturePipelineRequest { */ ChimeSdkMeetingConfiguration?: ChimeSdkMeetingConfiguration; + /** + *An object that contains server side encryption parameters to be used by media capture + * pipeline. The parameters can also be used by media concatenation pipeline taking media + * capture pipeline as a media source.
+ * @public + */ + SseAwsKeyManagementParams?: SseAwsKeyManagementParams; + + /** + *The Amazon Resource Name (ARN) of the sink role to be used with AwsKmsKeyId
+ * in SseAwsKeyManagementParams
. Can only interact with S3Bucket
+ * sink type. The role must belong to the caller’s account and be able to act on behalf of the
+ * caller during the API call. All minimum policy permissions requirements for the caller to
+ * perform sink-related actions are the same for SinkIamRoleArn
.
Additionally, the role must have permission to kms:GenerateDataKey
using
+ * KMS key supplied as AwsKmsKeyId
in SseAwsKeyManagementParams
. If
+ * media concatenation will be required later, the role must also have permission to
+ * kms:Decrypt
for the same KMS key.
The tag key-value pairs.
* @public @@ -1368,6 +1456,21 @@ export interface MediaCapturePipeline { * @public */ ChimeSdkMeetingConfiguration?: ChimeSdkMeetingConfiguration; + + /** + *An object that contains server side encryption parameters to be used by media capture + * pipeline. The parameters can also be used by media concatenation pipeline taking media + * capture pipeline as a media source.
+ * @public + */ + SseAwsKeyManagementParams?: SseAwsKeyManagementParams; + + /** + *The Amazon Resource Name (ARN) of the sink role to be used with AwsKmsKeyId
+ * in SseAwsKeyManagementParams
.
Turns language identification on or off for multiple languages.
" + "smithy.api#documentation": "Turns language identification on or off for multiple languages.
\nCalls to this API must include a LanguageCode
, IdentifyLanguage
, or IdentifyMultipleLanguages
parameter. \n If you include more than one of those parameters, your transcription job fails.
The configuration for a specified media pipeline. SourceType
must\n be ChimeSdkMeeting
.
An object that contains server side encryption parameters to be used by media capture\n pipeline. The parameters can also be used by media concatenation pipeline taking media\n capture pipeline as a media source.
" + } + }, + "SinkIamRoleArn": { + "target": "com.amazonaws.chimesdkmediapipelines#Arn", + "traits": { + "smithy.api#documentation": "The Amazon Resource Name (ARN) of the sink role to be used with AwsKmsKeyId
\n in SseAwsKeyManagementParams
. Can only interact with S3Bucket
\n sink type. The role must belong to the caller’s account and be able to act on behalf of the\n caller during the API call. All minimum policy permissions requirements for the caller to\n perform sink-related actions are the same for SinkIamRoleArn
.
Additionally, the role must have permission to kms:GenerateDataKey
using\n KMS key supplied as AwsKmsKeyId
in SseAwsKeyManagementParams
. If\n media concatenation will be required later, the role must also have permission to\n kms:Decrypt
for the same KMS key.
The configuration for a specified media pipeline. SourceType
must\n be ChimeSdkMeeting
.
An object that contains server side encryption parameters to be used by media capture\n pipeline. The parameters can also be used by media concatenation pipeline taking media\n capture pipeline as a media source.
" + } + }, + "SinkIamRoleArn": { + "target": "com.amazonaws.chimesdkmediapipelines#Arn", + "traits": { + "smithy.api#documentation": "The Amazon Resource Name (ARN) of the sink role to be used with AwsKmsKeyId
\n in SseAwsKeyManagementParams
.
The configuration settings for the SQS sink.
" } }, + "com.amazonaws.chimesdkmediapipelines#SseAwsKeyManagementParams": { + "type": "structure", + "members": { + "AwsKmsKeyId": { + "target": "com.amazonaws.chimesdkmediapipelines#String", + "traits": { + "smithy.api#documentation": "The KMS key you want to use to encrypt your media pipeline output.\n Decryption is required for concatenation pipeline. If using a key located in the current\n Amazon Web Services account, you can specify your KMS key in one of four\n ways:
\nUse the KMS key ID itself. For example,\n 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an alias for the KMS key ID. For example,\n alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For example,\n arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,\n arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than the current\n Amazon Web Services account, you can specify your KMS key in one of two\n ways:
\nUse the ARN for the KMS key ID. For example,\n arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,\n arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If you don't specify an encryption key, your output is encrypted with the default\n Amazon S3 key (SSE-S3).
\nNote that the role specified in the SinkIamRoleArn
request parameter must\n have permission to use the specified KMS key.
Base64-encoded string of a UTF-8 encoded JSON, which contains the encryption context as\n non-secret key-value pair known as encryption context pairs, that provides an added layer\n of security for your data. For more information, see KMS encryption\n context and Asymmetric keys in KMS in the Key Management Service Developer\n Guide.
" + } + } + }, + "traits": { + "smithy.api#documentation": "Contains server side encryption parameters to be used by media capture pipeline. The\n parameters can also be used by media concatenation pipeline taking media capture pipeline\n as a media source.
" + } + }, "com.amazonaws.chimesdkmediapipelines#StartSpeakerSearchTask": { "type": "operation", "input": {