@Generated(value="software.amazon.awssdk:codegen") public final class ParallelDataDataLocation extends Object implements SdkPojo, Serializable, ToCopyableBuilder<ParallelDataDataLocation.Builder,ParallelDataDataLocation>
The location of the most recent parallel data input file that was successfully imported into Amazon Translate.
| Modifier and Type | Class and Description |
|---|---|
static interface |
ParallelDataDataLocation.Builder |
| Modifier and Type | Method and Description |
|---|---|
static ParallelDataDataLocation.Builder |
builder() |
boolean |
equals(Object obj) |
boolean |
equalsBySdkFields(Object obj) |
<T> Optional<T> |
getValueForField(String fieldName,
Class<T> clazz) |
int |
hashCode() |
String |
location()
The Amazon S3 location of the parallel data input file.
|
String |
repositoryType()
Describes the repository that contains the parallel data input file.
|
List<SdkField<?>> |
sdkFields() |
static Class<? extends ParallelDataDataLocation.Builder> |
serializableBuilderClass() |
ParallelDataDataLocation.Builder |
toBuilder() |
String |
toString()
Returns a string representation of this object.
|
clone, finalize, getClass, notify, notifyAll, wait, wait, waitcopypublic final String repositoryType()
Describes the repository that contains the parallel data input file.
public final String location()
The Amazon S3 location of the parallel data input file. The location is returned as a presigned URL to that has a 30 minute expiration.
Amazon Translate doesn't scan all input files for the risk of CSV injection attacks.
CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.
Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.
Amazon Translate doesn't scan all input files for the risk of CSV injection attacks.
CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.
Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.
public ParallelDataDataLocation.Builder toBuilder()
toBuilder in interface ToCopyableBuilder<ParallelDataDataLocation.Builder,ParallelDataDataLocation>public static ParallelDataDataLocation.Builder builder()
public static Class<? extends ParallelDataDataLocation.Builder> serializableBuilderClass()
public final boolean equalsBySdkFields(Object obj)
equalsBySdkFields in interface SdkPojopublic final String toString()
Copyright © 2022. All rights reserved.