Interface ParallelDataDataLocation.Builder
- All Superinterfaces:
- Buildable,- CopyableBuilder<ParallelDataDataLocation.Builder,,- ParallelDataDataLocation> - SdkBuilder<ParallelDataDataLocation.Builder,,- ParallelDataDataLocation> - SdkPojo
- Enclosing class:
- ParallelDataDataLocation
- 
Method SummaryModifier and TypeMethodDescriptionThe Amazon S3 location of the parallel data input file.repositoryType(String repositoryType) Describes the repository that contains the parallel data input file.Methods inherited from interface software.amazon.awssdk.utils.builder.CopyableBuildercopyMethods inherited from interface software.amazon.awssdk.utils.builder.SdkBuilderapplyMutation, buildMethods inherited from interface software.amazon.awssdk.core.SdkPojoequalsBySdkFields, sdkFieldNameToField, sdkFields
- 
Method Details- 
repositoryTypeDescribes the repository that contains the parallel data input file. - Parameters:
- repositoryType- Describes the repository that contains the parallel data input file.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
 
- 
locationThe Amazon S3 location of the parallel data input file. The location is returned as a presigned URL to that has a 30-minute expiration. Amazon Translate doesn't scan all input files for the risk of CSV injection attacks. CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it. Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator. - Parameters:
- location- The Amazon S3 location of the parallel data input file. The location is returned as a presigned URL to that has a 30-minute expiration.- Amazon Translate doesn't scan all input files for the risk of CSV injection attacks. - CSV injection occurs when a .csv or .tsv file is altered so that a record contains malicious code. The record begins with a special character, such as =, +, -, or @. When the file is opened in a spreadsheet program, the program might interpret the record as a formula and run the code within it. - Before you download an input file from Amazon S3, ensure that you recognize the file and trust its creator. 
- Returns:
- Returns a reference to this object so that method calls can be chained together.
 
 
-