@Generated(value="software.amazon.awssdk:codegen") public final class TerminologyDataLocation extends Object implements SdkPojo, Serializable, ToCopyableBuilder<TerminologyDataLocation.Builder,TerminologyDataLocation>
The location of the custom terminology data.
| Modifier and Type | Class and Description |
|---|---|
static interface |
TerminologyDataLocation.Builder |
| Modifier and Type | Method and Description |
|---|---|
static TerminologyDataLocation.Builder |
builder() |
boolean |
equals(Object obj) |
boolean |
equalsBySdkFields(Object obj) |
<T> Optional<T> |
getValueForField(String fieldName,
Class<T> clazz) |
int |
hashCode() |
String |
location()
The Amazon S3 location of the most recent custom terminology input file that was successfully imported into
Amazon Translate.
|
String |
repositoryType()
The repository type for the custom terminology data.
|
List<SdkField<?>> |
sdkFields() |
static Class<? extends TerminologyDataLocation.Builder> |
serializableBuilderClass() |
TerminologyDataLocation.Builder |
toBuilder() |
String |
toString()
Returns a string representation of this object.
|
clone, finalize, getClass, notify, notifyAll, wait, wait, waitcopypublic final String repositoryType()
The repository type for the custom terminology data.
public final String location()
The Amazon S3 location of the most recent custom terminology input file that was successfully imported into Amazon Translate. The location is returned as a presigned URL that has a 30 minute expiration.
Amazon Translate doesn't scan all input files for the risk of CSV injection attacks.
CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.
Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.
Amazon Translate doesn't scan all input files for the risk of CSV injection attacks.
CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.
Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.
public TerminologyDataLocation.Builder toBuilder()
toBuilder in interface ToCopyableBuilder<TerminologyDataLocation.Builder,TerminologyDataLocation>public static TerminologyDataLocation.Builder builder()
public static Class<? extends TerminologyDataLocation.Builder> serializableBuilderClass()
public final boolean equalsBySdkFields(Object obj)
equalsBySdkFields in interface SdkPojopublic final String toString()
Copyright © 2022. All rights reserved.