Interface TerminologyDataLocation.Builder
- All Superinterfaces:
Buildable
,CopyableBuilder<TerminologyDataLocation.Builder,
,TerminologyDataLocation> SdkBuilder<TerminologyDataLocation.Builder,
,TerminologyDataLocation> SdkPojo
- Enclosing class:
TerminologyDataLocation
-
Method Summary
Modifier and TypeMethodDescriptionThe Amazon S3 location of the most recent custom terminology input file that was successfully imported into Amazon Translate.repositoryType
(String repositoryType) The repository type for the custom terminology data.Methods inherited from interface software.amazon.awssdk.utils.builder.CopyableBuilder
copy
Methods inherited from interface software.amazon.awssdk.utils.builder.SdkBuilder
applyMutation, build
Methods inherited from interface software.amazon.awssdk.core.SdkPojo
equalsBySdkFields, sdkFields
-
Method Details
-
repositoryType
The repository type for the custom terminology data.
- Parameters:
repositoryType
- The repository type for the custom terminology data.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
location
The Amazon S3 location of the most recent custom terminology input file that was successfully imported into Amazon Translate. The location is returned as a presigned URL that has a 30-minute expiration .
Amazon Translate doesn't scan all input files for the risk of CSV injection attacks.
CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.
Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.
- Parameters:
location
- The Amazon S3 location of the most recent custom terminology input file that was successfully imported into Amazon Translate. The location is returned as a presigned URL that has a 30-minute expiration .Amazon Translate doesn't scan all input files for the risk of CSV injection attacks.
CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it.
Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-