cdk-docker-image-deployment 0.0.0 → 0.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -8,7 +8,7 @@
8
8
  },
9
9
  "bundled": {
10
10
  "@types/aws-lambda": "^8.10.102",
11
- "aws-sdk": "^2.1204.0"
11
+ "aws-sdk": "^2.1205.0"
12
12
  },
13
13
  "dependencies": {
14
14
  "aws-cdk-lib": "^2.24.0",
@@ -2987,8 +2987,8 @@
2987
2987
  "docs": {
2988
2988
  "stability": "stable"
2989
2989
  },
2990
- "homepage": "git@github.com:cdklabs/cdk-docker-image-deployment.git",
2991
- "jsiiVersion": "1.65.0 (build 7a02b7f)",
2990
+ "homepage": "https://github.com/cdklabs/cdk-docker-image-deployment#readme",
2991
+ "jsiiVersion": "1.65.1 (build b0947e4)",
2992
2992
  "keywords": [
2993
2993
  "cdk"
2994
2994
  ],
@@ -3003,11 +3003,11 @@
3003
3003
  },
3004
3004
  "name": "cdk-docker-image-deployment",
3005
3005
  "readme": {
3006
- "markdown": "## My Project\n\n## DockerImageDeployment\n\nThis module allows you to copy docker image assets to a repository you control. This can be necessary if you want to build a Docker image in one CDK app and consume it in a different app or outside the CDK, or if you want to apply a lifecycle policy to all images of a part of your application.\n\n### Example usage\n```\nimport * as ecr from 'aws-cdk-lib/aws-ecr';\nimport * as imagedeploy from 'aws-cdk-lib/aws-docker-image-deployment';\n\nconst repo = new ecr.Repository.fromRepositoryName(this, 'ExampleRepository', 'examplerepository');\n\nnew imagedeploy.DockerImageDeployment(this, 'ExampleImageDeployment', {\n source: imagedeploy.Source.directory('path/to/directory'),\n destination: imagedeploy.Destination.ecr(repo)\n});\n\n```\n#### Controlling the tag\n```\nnew imagedeploy.DockerImageDeployment(this, 'ExampleImageDeploymentWithTag', {\n source: imagedeploy.Source.directory('path/to/directory'),\n destination: imagedeploy.Destination.ecr(repo, {\n tag: 'exampletag'\n })\n});\n```\n\n#### Under the hood\n1. When this stack is deployed (either via cdk deploy or via CI/CD), the contents of the (local Docker) image will be archived and uploaded to an intermediary assets ECR Repository using the cdk-assets mechanism.\n2. The `DockerImageDeployment` construct synthesizes a Codebuild Project which uses docker to pull the image from the intermediary repository, tag the image if a tag is provided, and push the image to the destination repository.\n\n## Security\n\nSee [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information.\n\n## License\n\nThis project is licensed under the Apache-2.0 License.\n"
3006
+ "markdown": "## CDK Docker Image Deployment\n\nThis module allows you to copy docker image assets to a repository you control.\nThis can be necessary if you want to build a Docker image in one CDK app and consume it in a different app or outside the CDK,\nor if you want to apply a lifecycle policy to all images of a part of your application.\n\n### Getting Started\n\nBelow is a basic example for how to use the `DockerImageDeployment` API:\n\n```ts\nimport * as ecr from 'aws-cdk-lib/aws-ecr';\nimport * as imagedeploy from 'cdk-docker-image-deployment';\n\nconst repo = new ecr.Repository.fromRepositoryName(this, 'MyRepository', 'myrepository');\n\nnew imagedeploy.DockerImageDeployment(this, 'ExampleImageDeploymentWithTag', {\n source: imagedeploy.Source.directory('path/to/directory'),\n destination: imagedeploy.Destination.ecr(repo, {\n tag: 'myspecialtag',\n });\n});\n```\n\n### Currently Supported Sources\n\n- `Source.directory()`: Supply a path to a local docker image as source.\n\n> Don't see a source listed? See if there is an open [issue](https://github.com/cdklabs/cdk-docker-image-deployment/issues)\n> or [PR](https://github.com/cdklabs/cdk-docker-image-deployment/pulls) already. If not, please open an issue asking for it\n> or better yet, submit a contribution!\n\n### Currently Supported Destinations\n\n- `Destination.ecr(repo, options)`: Send your docker image to an ECR repository in your stack's account.\n\n> Don't see a destination listed? See if there is an open [issue](https://github.com/cdklabs/cdk-docker-image-deployment/issues)\n> or [PR](https://github.com/cdklabs/cdk-docker-image-deployment/pulls) already. If not, please open an issue asking for it\n> or better yet, submit a contribution!\n\n### Under the Hood\n\n1. When this stack is deployed (either via cdk deploy or via CI/CD), the contents of the local Docker image will be archived and uploaded to an intermediary assets ECR Repository using the cdk-assets mechanism.\n\n2. The `DockerImageDeployment` construct synthesizes a CodeBuild Project which uses docker to pull the image from the intermediary repository, tag the image if a tag is provided, and push the image to the destination repository.\n\n3. The deployment will wait until the CodeBuild Project completes successfully before finishing.\n\nThe architecture of this construct can be seen here:\n\n![Construct-Architecture](https://user-images.githubusercontent.com/36202692/187282269-7ab29d3e-192f-470f-9123-5dbb62d9dac3.jpg)\n\n\n## Security\n\nSee [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information.\n\n## License\n\nThis project is licensed under the Apache-2.0 License.\n"
3007
3007
  },
3008
3008
  "repository": {
3009
3009
  "type": "git",
3010
- "url": "git@github.com:cdklabs/cdk-docker-image-deployment.git"
3010
+ "url": "https://github.com/cdklabs/cdk-docker-image-deployment.git"
3011
3011
  },
3012
3012
  "schema": "jsii/0.10.0",
3013
3013
  "targets": {
@@ -3549,6 +3549,6 @@
3549
3549
  "symbolId": "src/source:SourceContext"
3550
3550
  }
3551
3551
  },
3552
- "version": "0.0.0",
3553
- "fingerprint": "Jr+ovwPuDgJHPeZl11401H1e83hs0+t3ml5X7RMwgDE="
3552
+ "version": "0.0.3",
3553
+ "fingerprint": "8cNKM7PbZMQprp59cSNwXRIHlzEGaI5A5jSyRQhn/os="
3554
3554
  }
package/README.md CHANGED
@@ -1,35 +1,55 @@
1
- ## My Project
1
+ ## CDK Docker Image Deployment
2
2
 
3
- ## DockerImageDeployment
3
+ This module allows you to copy docker image assets to a repository you control.
4
+ This can be necessary if you want to build a Docker image in one CDK app and consume it in a different app or outside the CDK,
5
+ or if you want to apply a lifecycle policy to all images of a part of your application.
4
6
 
5
- This module allows you to copy docker image assets to a repository you control. This can be necessary if you want to build a Docker image in one CDK app and consume it in a different app or outside the CDK, or if you want to apply a lifecycle policy to all images of a part of your application.
7
+ ### Getting Started
6
8
 
7
- ### Example usage
8
- ```
9
- import * as ecr from 'aws-cdk-lib/aws-ecr';
10
- import * as imagedeploy from 'aws-cdk-lib/aws-docker-image-deployment';
9
+ Below is a basic example for how to use the `DockerImageDeployment` API:
11
10
 
12
- const repo = new ecr.Repository.fromRepositoryName(this, 'ExampleRepository', 'examplerepository');
11
+ ```ts
12
+ import * as ecr from 'aws-cdk-lib/aws-ecr';
13
+ import * as imagedeploy from 'cdk-docker-image-deployment';
13
14
 
14
- new imagedeploy.DockerImageDeployment(this, 'ExampleImageDeployment', {
15
- source: imagedeploy.Source.directory('path/to/directory'),
16
- destination: imagedeploy.Destination.ecr(repo)
17
- });
15
+ const repo = new ecr.Repository.fromRepositoryName(this, 'MyRepository', 'myrepository');
18
16
 
19
- ```
20
- #### Controlling the tag
21
- ```
22
17
  new imagedeploy.DockerImageDeployment(this, 'ExampleImageDeploymentWithTag', {
23
18
  source: imagedeploy.Source.directory('path/to/directory'),
24
19
  destination: imagedeploy.Destination.ecr(repo, {
25
- tag: 'exampletag'
26
- })
20
+ tag: 'myspecialtag',
21
+ });
27
22
  });
28
23
  ```
29
24
 
30
- #### Under the hood
31
- 1. When this stack is deployed (either via cdk deploy or via CI/CD), the contents of the (local Docker) image will be archived and uploaded to an intermediary assets ECR Repository using the cdk-assets mechanism.
32
- 2. The `DockerImageDeployment` construct synthesizes a Codebuild Project which uses docker to pull the image from the intermediary repository, tag the image if a tag is provided, and push the image to the destination repository.
25
+ ### Currently Supported Sources
26
+
27
+ - `Source.directory()`: Supply a path to a local docker image as source.
28
+
29
+ > Don't see a source listed? See if there is an open [issue](https://github.com/cdklabs/cdk-docker-image-deployment/issues)
30
+ > or [PR](https://github.com/cdklabs/cdk-docker-image-deployment/pulls) already. If not, please open an issue asking for it
31
+ > or better yet, submit a contribution!
32
+
33
+ ### Currently Supported Destinations
34
+
35
+ - `Destination.ecr(repo, options)`: Send your docker image to an ECR repository in your stack's account.
36
+
37
+ > Don't see a destination listed? See if there is an open [issue](https://github.com/cdklabs/cdk-docker-image-deployment/issues)
38
+ > or [PR](https://github.com/cdklabs/cdk-docker-image-deployment/pulls) already. If not, please open an issue asking for it
39
+ > or better yet, submit a contribution!
40
+
41
+ ### Under the Hood
42
+
43
+ 1. When this stack is deployed (either via cdk deploy or via CI/CD), the contents of the local Docker image will be archived and uploaded to an intermediary assets ECR Repository using the cdk-assets mechanism.
44
+
45
+ 2. The `DockerImageDeployment` construct synthesizes a CodeBuild Project which uses docker to pull the image from the intermediary repository, tag the image if a tag is provided, and push the image to the destination repository.
46
+
47
+ 3. The deployment will wait until the CodeBuild Project completes successfully before finishing.
48
+
49
+ The architecture of this construct can be seen here:
50
+
51
+ ![Construct-Architecture](https://user-images.githubusercontent.com/36202692/187282269-7ab29d3e-192f-470f-9123-5dbb62d9dac3.jpg)
52
+
33
53
 
34
54
  ## Security
35
55
 
@@ -26,7 +26,7 @@ class Destination {
26
26
  }
27
27
  exports.Destination = Destination;
28
28
  _a = JSII_RTTI_SYMBOL_1;
29
- Destination[_a] = { fqn: "cdk-docker-image-deployment.Destination", version: "0.0.0" };
29
+ Destination[_a] = { fqn: "cdk-docker-image-deployment.Destination", version: "0.0.3" };
30
30
  /**
31
31
  * Class used when the destination of docker image deployment is an ECR repository in the same account as the stack
32
32
  */
@@ -114,5 +114,5 @@ class DockerImageDeployment extends constructs_1.Construct {
114
114
  }
115
115
  exports.DockerImageDeployment = DockerImageDeployment;
116
116
  _a = JSII_RTTI_SYMBOL_1;
117
- DockerImageDeployment[_a] = { fqn: "cdk-docker-image-deployment.DockerImageDeployment", version: "0.0.0" };
117
+ DockerImageDeployment[_a] = { fqn: "cdk-docker-image-deployment.DockerImageDeployment", version: "0.0.3" };
118
118
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"docker-image-deployment.js","sourceRoot":"","sources":["../src/docker-image-deployment.ts"],"names":[],"mappings":";;;;;AAAA,6BAA6B;AAC7B,6CAAyE;AACzE,uDAAuD;AACvD,2CAA2C;AAC3C,uDAAiD;AACjD,wDAAwD;AACxD,mDAAmD;AACnD,2CAAuC;AAgBvC;;GAEG;AACH,MAAa,qBAAsB,SAAQ,sBAAS;IAGlD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAiC;QACzE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,WAAW,GAAG,IAAI,GAAG,CAAC,IAAI,CAAC,IAAI,EAAE,uBAAuB,EAAE;YAC9D,SAAS,EAAE,IAAI,GAAG,CAAC,gBAAgB,CAAC,yBAAyB,CAAC;SAC/D,CAAC,CAAC;QAEH,MAAM,YAAY,GAAG,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,WAAW,EAAE,CAAC,CAAC;QAC9D,MAAM,iBAAiB,GAAG,KAAK,CAAC,WAAW,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;QAE9D,MAAM,SAAS,GAAG,YAAY,CAAC,QAAQ,CAAC;QAExC,MAAM,OAAO,GAAG,iBAAiB,CAAC,cAAc,IAAI,YAAY,CAAC,QAAQ,CAAC;QAC1E,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE1B,MAAM,OAAO,GAAG,GAAG,iBAAiB,CAAC,cAAc,IAAI,OAAO,EAAE,CAAC;QAEjE,MAAM,QAAQ,GAAG;YACf,YAAY,CAAC,WAAW,CAAC,YAAY;YACrC,eAAe,SAAS,EAAE;YAC1B,cAAc,SAAS,IAAI,OAAO,EAAE;SACrC,CAAC;QAEF,IAAI,YAAY,CAAC,WAAW,CAAC,MAAM,KAAK,iBAAiB,CAAC,WAAW,CAAC,MAAM,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,MAAM,EAAE,EAAE,gEAAgE;YAClL,QAAQ,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;YAC/B,QAAQ,CAAC,IAAI,CAAC,iBAAiB,CAAC,WAAW,CAAC,YAAY,CAAC,CAAC;SAC3D;QAED,QAAQ,CAAC,IAAI,CAAC,eAAe,OAAO,EAAE,CAAC,CAAC;QACxC,QAAQ,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/B,IAAI,CAAC,EAAE,GAAG,IAAI,SAAS,CAAC,OAAO,CAAC,IAAI,EAAE,0BAA0B,EAAE;YAChE,SAAS,EAAE,SAAS,CAAC,SAAS,CAAC,UAAU,CAAC;gBACxC,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,KAAK,EAAE;wBACL,QAAQ,EAAE,QAAQ;qBACnB;iBACF;aACF,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,IAAI;gBAChB,UAAU,EAAE,SAAS,CAAC,eAAe,CAAC,YAAY;aACnD;YACD,IAAI,EAAE,WAAW;SAClB,CAAC,CAAC;QAEH,MAAM,cAAc,GAAG,IAAI,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACvE,KAAK,EAAE,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,4BAA4B,CAAC;YACzD,OAAO,EAAE,gBAAgB;YACzB,OAAO,EAAE,oBAAO,CAAC,WAAW;SAC7B,CAAC,CAAC;QAEH,MAAM,iBAAiB,GAAG,IAAI,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,mBAAmB,EAAE;YAC7E,KAAK,EAAE,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,4BAA4B,CAAC;YACzD,OAAO,EAAE,mBAAmB;YAC5B,OAAO,EAAE,oBAAO,CAAC,WAAW;SAC7B,CAAC,CAAC;QAEH,sFAAsF;QACtF,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,cAAc,CAAC;YAC5C,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,YAAY,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC;YAClC,KAAK,EAAE,IAAI;SACZ,CAAC,CAAC;QAEH,MAAM,eAAe,GAAG,GAAG,CAAC,KAAK,CAAC,cAAc,CAAC;YAC/C,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE;gBACP,gCAAgC;gBAChC,0BAA0B;aAC3B;YACD,YAAY,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC,UAAU,CAAC;YAClC,KAAK,EAAE,IAAI;SACZ,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,IAAI,EAAE,CAAC,QAAQ,CAAC,IAAI,EAAE,YAAY,EAAE;YACrD,cAAc,EAAE,cAAc;YAC9B,iBAAiB,EAAE,iBAAiB;YACpC,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YACnC,YAAY,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACnC,CAAC,CAAC;QAEH,MAAM,cAAc,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,iBAAiB,IAAI,CAAC,GAAG,EAAE,CAAC,QAAQ,EAAE,EAAE,EAAE;YACxF,YAAY,EAAE,UAAU,CAAC,YAAY;YACrC,UAAU,EAAE;gBACV,WAAW,EAAE,IAAI,CAAC,EAAE,CAAC,WAAW;aACjC;SACF,CAAC,CAAC;QAEH,cAAc,CAAC,IAAI,CAAC,aAAa,CAAC,YAAY,EAAE,eAAe,CAAC,CAAC;QAEjE,IAAI;YACF,IAAI,uBAAS,CAAC,IAAI,EAAE,sBAAsB,EAAE;gBAC1C,KAAK,EAAE,GAAG,cAAc,CAAC,YAAY,CAAC,QAAQ,CAAC,wBAAwB,cAAc,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE;aAC1G,CAAC,CAAC;SACJ;QAAC,OAAO,KAAK,EAAE;YACd,MAAM,IAAI,KAAK,CAAC,mDAAmD,CAAC,CAAC;SACtE;IACH,CAAC;IAEO,WAAW,CAAC,GAAW;QAC7B,IAAI,mBAAK,CAAC,YAAY,CAAC,GAAG,CAAC,EAAE;YAC3B,OAAO,CAAC,4DAA4D;SACrE;QACD,IAAI,GAAG,CAAC,MAAM,GAAG,GAAG,EAAE;YACpB,MAAM,IAAI,KAAK,CAAE,uEAAuE,GAAG,QAAQ,GAAG,CAAC,MAAM,aAAa,CAAC,CAAC;SAC7H;QACD,IAAI,CAAC,wBAAwB,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE;YACvC,MAAM,IAAI,KAAK,CAAC,0IAA0I,GAAG,EAAE,CAAC,CAAC;SAClK;IACH,CAAC;;AAnHH,sDAoHC","sourcesContent":["import * as path from 'path';\nimport { CustomResource, Duration, CfnOutput, Token } from 'aws-cdk-lib';\nimport * as codebuild from 'aws-cdk-lib/aws-codebuild';\nimport * as iam from 'aws-cdk-lib/aws-iam';\nimport { Runtime } from 'aws-cdk-lib/aws-lambda';\nimport * as lambda from 'aws-cdk-lib/aws-lambda-nodejs';\nimport * as cr from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\nimport { Destination } from './destination';\nimport { Source } from './source';\n\nexport interface DockerImageDeploymentProps {\n  /**\n   * Source of the image to deploy.\n   */\n  readonly source: Source;\n\n  /**\n   * Destination repository to deploy the image to.\n   */\n  readonly destination: Destination;\n}\n\n/**\n * `DockerImageDeployment` pushes an image from a local or external source to a specified external destination\n */\nexport class DockerImageDeployment extends Construct {\n  private readonly cb: codebuild.Project;\n\n  constructor(scope: Construct, id: string, props: DockerImageDeploymentProps) {\n    super(scope, id);\n\n    const handlerRole = new iam.Role(this, 'DockerImageDeployRole', {\n      assumedBy: new iam.ServicePrincipal('codebuild.amazonaws.com'),\n    });\n\n    const sourceConfig = props.source.bind(this, { handlerRole });\n    const destinationConfig = props.destination.bind(handlerRole);\n\n    const sourceUri = sourceConfig.imageUri;\n\n    const destTag = destinationConfig.destinationTag ?? sourceConfig.imageTag;\n    this.validateTag(destTag);\n\n    const destUri = `${destinationConfig.destinationUri}:${destTag}`;\n\n    const commands = [\n      sourceConfig.loginConfig.loginCommand,\n      `docker pull ${sourceUri}`,\n      `docker tag ${sourceUri} ${destUri}`,\n    ];\n\n    if (sourceConfig.loginConfig.region !== destinationConfig.loginConfig.region || !sourceConfig.loginConfig.region) { // different regions or either undefined should logout and login\n      commands.push('docker logout');\n      commands.push(destinationConfig.loginConfig.loginCommand);\n    }\n\n    commands.push(`docker push ${destUri}`);\n    commands.push('docker logout');\n\n    this.cb = new codebuild.Project(this, 'DockerImageDeployProject', {\n      buildSpec: codebuild.BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          build: {\n            commands: commands,\n          },\n        },\n      }),\n      environment: {\n        privileged: true,\n        buildImage: codebuild.LinuxBuildImage.STANDARD_5_0,\n      },\n      role: handlerRole,\n    });\n\n    const onEventHandler = new lambda.NodejsFunction(this, 'onEventHandler', {\n      entry: path.join(__dirname, 'codebuild-handler/index.ts'),\n      handler: 'onEventhandler',\n      runtime: Runtime.NODEJS_16_X,\n    });\n\n    const isCompleteHandler = new lambda.NodejsFunction(this, 'isCompleteHandler', {\n      entry: path.join(__dirname, 'codebuild-handler/index.ts'),\n      handler: 'isCompleteHandler',\n      runtime: Runtime.NODEJS_16_X,\n    });\n\n    // https://github.com/aws/aws-cdk/issues/21721 issue to add grant methods to codebuild\n    const grantOnEvent = iam.Grant.addToPrincipal({\n      grantee: onEventHandler,\n      actions: ['codebuild:StartBuild'],\n      resourceArns: [this.cb.projectArn],\n      scope: this,\n    });\n\n    const grantIsComplete = iam.Grant.addToPrincipal({\n      grantee: isCompleteHandler,\n      actions: [\n        'codebuild:ListBuildsForProject',\n        'codebuild:BatchGetBuilds',\n      ],\n      resourceArns: [this.cb.projectArn],\n      scope: this,\n    });\n\n    const crProvider = new cr.Provider(this, 'CRProvider', {\n      onEventHandler: onEventHandler,\n      isCompleteHandler: isCompleteHandler,\n      queryInterval: Duration.seconds(30),\n      totalTimeout: Duration.minutes(30),\n    });\n\n    const customResource = new CustomResource(this, `CustomResource${Date.now().toString()}`, {\n      serviceToken: crProvider.serviceToken,\n      properties: {\n        projectName: this.cb.projectName,\n      },\n    });\n\n    customResource.node.addDependency(grantOnEvent, grantIsComplete);\n\n    try {\n      new CfnOutput(this, 'CustomResourceReport', {\n        value: `${customResource.getAttString('Status')}, see the logs here: ${customResource.getAtt('LogsUrl')}`,\n      });\n    } catch (error) {\n      throw new Error('Error getting the report from the custom resource');\n    }\n  }\n\n  private validateTag(tag: string): void {\n    if (Token.isUnresolved(tag)) {\n      return; // if token tag is likely from source, so assume it is valid\n    }\n    if (tag.length > 128) {\n      throw new Error (`Invalid tag: tags may contain a maximum of 128 characters; your tag ${tag} has ${tag.length} characters`);\n    }\n    if (!/^[^-.][a-zA-Z0-9-_.]+$/.test(tag)) {\n      throw new Error(`Invalid tag: tags must contain alphanumeric characters and \\'-\\' \\'_\\' \\'.\\' only and must not begin with \\'.\\' or \\'-\\'; your tag was ${tag}`);\n    }\n  }\n}\n"]}
package/lib/source.js CHANGED
@@ -29,7 +29,7 @@ class Source {
29
29
  }
30
30
  exports.Source = Source;
31
31
  _a = JSII_RTTI_SYMBOL_1;
32
- Source[_a] = { fqn: "cdk-docker-image-deployment.Source", version: "0.0.0" };
32
+ Source[_a] = { fqn: "cdk-docker-image-deployment.Source", version: "0.0.3" };
33
33
  /**
34
34
  * Source of docker image deployment is a local image from a directory
35
35
  */
@@ -1,7 +1,10 @@
1
1
  # Changelog for AWS SDK for JavaScript
2
- <!--LATEST=2.1204.0-->
2
+ <!--LATEST=2.1205.0-->
3
3
  <!--ENTRYINSERT-->
4
4
 
5
+ ## 2.1205.0
6
+ * feature: VoiceID: Amazon Connect Voice ID now detects voice spoofing. When a prospective fraudster tries to spoof caller audio using audio playback or synthesized speech, Voice ID will return a risk score and outcome to indicate the how likely it is that the voice is spoofed.
7
+
5
8
  ## 2.1204.0
6
9
  * feature: MediaPackage: This release adds Ads AdTriggers and AdsOnDeliveryRestrictions to describe calls for CMAF endpoints on MediaPackage.
7
10
  * feature: Token: Read sso data from sso-session section in SSOTokenProvider
@@ -29,7 +29,7 @@ For release notes, see the [CHANGELOG](https://github.com/aws/aws-sdk-js/blob/ma
29
29
  To use the SDK in the browser, simply add the following script tag to your
30
30
  HTML pages:
31
31
 
32
- <script src="https://sdk.amazonaws.com/js/aws-sdk-2.1204.0.min.js"></script>
32
+ <script src="https://sdk.amazonaws.com/js/aws-sdk-2.1205.0.min.js"></script>
33
33
 
34
34
  You can also build a custom browser SDK with your specified set of AWS services.
35
35
  This can allow you to reduce the SDK's size, specify different API versions of
@@ -57,7 +57,8 @@
57
57
  "members": {
58
58
  "DomainId": {}
59
59
  }
60
- }
60
+ },
61
+ "idempotent": true
61
62
  },
62
63
  "DeleteFraudster": {
63
64
  "input": {
@@ -279,7 +280,8 @@
279
280
  "RiskDetails": {
280
281
  "type": "structure",
281
282
  "required": [
282
- "KnownFraudsterRisk"
283
+ "KnownFraudsterRisk",
284
+ "VoiceSpoofingRisk"
283
285
  ],
284
286
  "members": {
285
287
  "KnownFraudsterRisk": {
@@ -293,6 +295,17 @@
293
295
  "type": "integer"
294
296
  }
295
297
  }
298
+ },
299
+ "VoiceSpoofingRisk": {
300
+ "type": "structure",
301
+ "required": [
302
+ "RiskScore"
303
+ ],
304
+ "members": {
305
+ "RiskScore": {
306
+ "type": "integer"
307
+ }
308
+ }
296
309
  }
297
310
  }
298
311
  }
@@ -853,7 +853,7 @@ declare namespace FSx {
853
853
  */
854
854
  JunctionPath: JunctionPath;
855
855
  /**
856
- * The security style for the volume. Specify one of the following values: UNIX if the file system is managed by a UNIX administrator, the majority of users are NFS clients, and an application accessing the data uses a UNIX user as the service account. UNIX is the default. NTFS if the file system is managed by a Windows administrator, the majority of users are SMB clients, and an application accessing the data uses a Windows user as the service account. MIXED if the file system is managed by both UNIX and Windows administrators and users consist of both NFS and SMB clients.
856
+ * The security style for the volume. If a volume's security style is not specified, it is automatically set to the root volume's security style. Specify one of the following values: UNIX if the file system is managed by a UNIX administrator, the majority of users are NFS clients, and an application accessing the data uses a UNIX user as the service account. NTFS if the file system is managed by a Windows administrator, the majority of users are SMB clients, and an application accessing the data uses a Windows user as the service account. MIXED if the file system is managed by both UNIX and Windows administrators and users consist of both NFS and SMB clients.
857
857
  */
858
858
  SecurityStyle?: SecurityStyle;
859
859
  /**
@@ -231,7 +231,7 @@ declare namespace VoiceID {
231
231
  */
232
232
  ClientToken?: ClientTokenString;
233
233
  /**
234
- * A brief description of this domain.
234
+ * A brief description of the domain.
235
235
  */
236
236
  Description?: Description;
237
237
  /**
@@ -429,7 +429,7 @@ declare namespace VoiceID {
429
429
  */
430
430
  ServerSideEncryptionConfiguration?: ServerSideEncryptionConfiguration;
431
431
  /**
432
- * Details about the most recent server-side encryption configuration update. When the server-side encryption configuration is changed, dependency on the old KMS key is removed through an asynchronous process. When this update is complete, the domains data can only be accessed using the new KMS key.
432
+ * Details about the most recent server-side encryption configuration update. When the server-side encryption configuration is changed, dependency on the old KMS key is removed through an asynchronous process. When this update is complete, the domain's data can only be accessed using the new KMS key.
433
433
  */
434
434
  ServerSideEncryptionUpdateDetails?: ServerSideEncryptionUpdateDetails;
435
435
  /**
@@ -513,7 +513,7 @@ declare namespace VoiceID {
513
513
  RiskThreshold: Score;
514
514
  }
515
515
  export type FraudDetectionDecision = "HIGH_RISK"|"LOW_RISK"|"NOT_ENOUGH_SPEECH"|string;
516
- export type FraudDetectionReason = "KNOWN_FRAUDSTER"|string;
516
+ export type FraudDetectionReason = "KNOWN_FRAUDSTER"|"VOICE_SPOOFING"|string;
517
517
  export type FraudDetectionReasons = FraudDetectionReason[];
518
518
  export interface FraudDetectionResult {
519
519
  /**
@@ -537,11 +537,11 @@ declare namespace VoiceID {
537
537
  */
538
538
  FraudDetectionResultId?: UniqueIdLarge;
539
539
  /**
540
- * The reason speaker was flagged by the fraud detection system. This is only be populated if fraud detection Decision is HIGH_RISK, and only has one possible value: KNOWN_FRAUDSTER.
540
+ * The reason speaker was flagged by the fraud detection system. This is only be populated if fraud detection Decision is HIGH_RISK, and the following possible values: KNOWN_FRAUDSTER and VOICE_SPOOFING.
541
541
  */
542
542
  Reasons?: FraudDetectionReasons;
543
543
  /**
544
- * Details about each risk analyzed for this speaker.
544
+ * Details about each risk analyzed for this speaker. Currently, this contains KnownFraudsterRisk and VoiceSpoofingRisk details.
545
545
  */
546
546
  RiskDetails?: FraudRiskDetails;
547
547
  }
@@ -550,6 +550,10 @@ declare namespace VoiceID {
550
550
  * The details resulting from 'Known Fraudster Risk' analysis of the speaker.
551
551
  */
552
552
  KnownFraudsterRisk: KnownFraudsterRisk;
553
+ /**
554
+ * The details resulting from 'Voice Spoofing Risk' analysis of the speaker.
555
+ */
556
+ VoiceSpoofingRisk: VoiceSpoofingRisk;
553
557
  }
554
558
  export interface Fraudster {
555
559
  /**
@@ -608,7 +612,7 @@ declare namespace VoiceID {
608
612
  */
609
613
  JobStatus?: FraudsterRegistrationJobStatus;
610
614
  /**
611
- * The output data config containing the S3 location where you want Voice ID to write your job output file; you must also include a KMS key iD in order to encrypt the file.
615
+ * The output data config containing the S3 location where you want Voice ID to write your job output file; you must also include a KMS key ID in order to encrypt the file.
612
616
  */
613
617
  OutputDataConfig?: OutputDataConfig;
614
618
  /**
@@ -640,7 +644,7 @@ declare namespace VoiceID {
640
644
  */
641
645
  JobId?: JobId;
642
646
  /**
643
- * The client-provied name for the fraudster registration job.
647
+ * The client-provided name for the fraudster registration job.
644
648
  */
645
649
  JobName?: JobName;
646
650
  /**
@@ -683,7 +687,7 @@ declare namespace VoiceID {
683
687
  }
684
688
  export interface ListDomainsRequest {
685
689
  /**
686
- * The maximum number of results that are returned per call. You can use NextToken to obtain further pages of results. The default is 100; the maximum allowed page size is also 100.
690
+ * The maximum number of domains to list per API call.
687
691
  */
688
692
  MaxResults?: MaxResultsForListDomainFe;
689
693
  /**
@@ -814,7 +818,7 @@ declare namespace VoiceID {
814
818
  }
815
819
  export interface OutputDataConfig {
816
820
  /**
817
- * the identifier of the KMS key you want Voice ID to use to encrypt the output file of the fraudster registration job.
821
+ * The identifier of the KMS key you want Voice ID to use to encrypt the output file of a speaker enrollment job/fraudster registration job.
818
822
  */
819
823
  KmsKeyId?: KmsKeyId;
820
824
  /**
@@ -836,7 +840,7 @@ declare namespace VoiceID {
836
840
  export type Score = number;
837
841
  export interface ServerSideEncryptionConfiguration {
838
842
  /**
839
- * The identifier of the KMS key you want Voice ID to use to encrypt your data.
843
+ * The identifier of the KMS key to use to encrypt data stored by Voice ID. Voice ID doesn't support asymmetric customer managed keys.
840
844
  */
841
845
  KmsKeyId: KmsKeyId;
842
846
  }
@@ -1033,7 +1037,7 @@ declare namespace VoiceID {
1033
1037
  */
1034
1038
  OutputDataConfig: OutputDataConfig;
1035
1039
  /**
1036
- * The registration config containing details such as the action to take when a duplicate fraudster is detected, and the similarity threshold to use for detecting a duplicate fraudster.
1040
+ * The registration config containing details such as the action to take when a duplicate fraudster is detected, and the similarity threshold to use for detecting a duplicate fraudster.
1037
1041
  */
1038
1042
  RegistrationConfig?: RegistrationConfig;
1039
1043
  }
@@ -1049,7 +1053,7 @@ declare namespace VoiceID {
1049
1053
  */
1050
1054
  ClientToken?: ClientTokenString;
1051
1055
  /**
1052
- * The IAM role Amazon Resource Name (ARN) that grants Voice ID permissions to access customer's buckets to read the input manifest file and write the job output file. Refer to Batch enrollment using audio data from prior calls documentation for the permissions needed in this role.
1056
+ * The IAM role Amazon Resource Name (ARN) that grants Voice ID permissions to access customer's buckets to read the input manifest file and write the job output file. Refer to Batch enrollment using audio data from prior calls for the permissions needed in this role.
1053
1057
  */
1054
1058
  DataAccessRoleArn: IamRoleArn;
1055
1059
  /**
@@ -1083,11 +1087,11 @@ declare namespace VoiceID {
1083
1087
  export type String = string;
1084
1088
  export interface Tag {
1085
1089
  /**
1086
- * The first part of a key:value pair that forms a tag associated with a given resource. For example, in the tag Department’:’Sales’, the key is 'Department'.
1090
+ * The first part of a key:value pair that forms a tag associated with a given resource. For example, in the tag 'Department':'Sales', the key is 'Department'.
1087
1091
  */
1088
1092
  Key: TagKey;
1089
1093
  /**
1090
- * The second part of a key:value pair that forms a tag associated with a given resource. For example, in the tag Department’:’Sales’, the value is 'Sales'.
1094
+ * The second part of a key:value pair that forms a tag associated with a given resource. For example, in the tag 'Department':'Sales', the value is 'Sales'.
1091
1095
  */
1092
1096
  Value: TagValue;
1093
1097
  }
@@ -1123,7 +1127,7 @@ declare namespace VoiceID {
1123
1127
  }
1124
1128
  export interface UpdateDomainRequest {
1125
1129
  /**
1126
- * A brief description about this domain.
1130
+ * A brief description of the domain.
1127
1131
  */
1128
1132
  Description?: Description;
1129
1133
  /**
@@ -1135,7 +1139,7 @@ declare namespace VoiceID {
1135
1139
  */
1136
1140
  Name: DomainName;
1137
1141
  /**
1138
- * The configuration, containing the KMS key identifier, to be used by Voice ID for the server-side encryption of your data. Note that all the existing data in the domain are still encrypted using the existing key, only the data added to domain after updating the key is encrypted using the new key.
1142
+ * The configuration, containing the KMS key identifier, to be used by Voice ID for the server-side encryption of your data. Changing the domain's associated KMS key immediately triggers an asynchronous process to remove dependency on the old KMS key, such that the domain's data can only be accessed using the new KMS key. The domain's ServerSideEncryptionUpdateDetails contains the details for this process.
1139
1143
  */
1140
1144
  ServerSideEncryptionConfiguration: ServerSideEncryptionConfiguration;
1141
1145
  }
@@ -1145,6 +1149,12 @@ declare namespace VoiceID {
1145
1149
  */
1146
1150
  Domain?: Domain;
1147
1151
  }
1152
+ export interface VoiceSpoofingRisk {
1153
+ /**
1154
+ * The score indicating the likelihood of speaker’s voice being spoofed.
1155
+ */
1156
+ RiskScore: Score;
1157
+ }
1148
1158
  /**
1149
1159
  * A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
1150
1160
  */
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1204.0',
86
+ VERSION: '2.1205.0',
87
87
 
88
88
  /**
89
89
  * @api private
@@ -395,7 +395,7 @@ return /******/ (function(modules) { // webpackBootstrap
395
395
  /**
396
396
  * @constant
397
397
  */
398
- VERSION: '2.1204.0',
398
+ VERSION: '2.1205.0',
399
399
 
400
400
  /**
401
401
  * @api private
@@ -59413,7 +59413,7 @@ return /******/ (function(modules) { // webpackBootstrap
59413
59413
  /* 1088 */
59414
59414
  /***/ (function(module, exports) {
59415
59415
 
59416
- module.exports = {"version":"2.0","metadata":{"apiVersion":"2021-09-27","endpointPrefix":"voiceid","jsonVersion":"1.0","protocol":"json","serviceFullName":"Amazon Voice ID","serviceId":"Voice ID","signatureVersion":"v4","signingName":"voiceid","targetPrefix":"VoiceID","uid":"voice-id-2021-09-27"},"operations":{"CreateDomain":{"input":{"type":"structure","required":["Name","ServerSideEncryptionConfiguration"],"members":{"ClientToken":{"idempotencyToken":true},"Description":{"shape":"S3"},"Name":{"shape":"S4"},"ServerSideEncryptionConfiguration":{"shape":"S5"},"Tags":{"shape":"S7"}}},"output":{"type":"structure","members":{"Domain":{"shape":"Sc"}}},"idempotent":true},"DeleteDomain":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{}}}},"DeleteFraudster":{"input":{"type":"structure","required":["DomainId","FraudsterId"],"members":{"DomainId":{},"FraudsterId":{"shape":"Sm"}}}},"DeleteSpeaker":{"input":{"type":"structure","required":["DomainId","SpeakerId"],"members":{"DomainId":{},"SpeakerId":{"shape":"So"}}}},"DescribeDomain":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{}}},"output":{"type":"structure","members":{"Domain":{"shape":"Sc"}}}},"DescribeFraudster":{"input":{"type":"structure","required":["DomainId","FraudsterId"],"members":{"DomainId":{},"FraudsterId":{"shape":"Sm"}}},"output":{"type":"structure","members":{"Fraudster":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DomainId":{},"GeneratedFraudsterId":{}}}}}},"DescribeFraudsterRegistrationJob":{"input":{"type":"structure","required":["DomainId","JobId"],"members":{"DomainId":{},"JobId":{}}},"output":{"type":"structure","members":{"Job":{"shape":"Sy"}}}},"DescribeSpeaker":{"input":{"type":"structure","required":["DomainId","SpeakerId"],"members":{"DomainId":{},"SpeakerId":{"shape":"So"}}},"output":{"type":"structure","members":{"Speaker":{"shape":"S1d"}}}},"DescribeSpeakerEnrollmentJob":{"input":{"type":"structure","required":["DomainId","JobId"],"members":{"DomainId":{},"JobId":{}}},"output":{"type":"structure","members":{"Job":{"shape":"S1j"}}}},"EvaluateSession":{"input":{"type":"structure","required":["DomainId","SessionNameOrId"],"members":{"DomainId":{},"SessionNameOrId":{}}},"output":{"type":"structure","members":{"AuthenticationResult":{"type":"structure","members":{"AudioAggregationEndedAt":{"type":"timestamp"},"AudioAggregationStartedAt":{"type":"timestamp"},"AuthenticationResultId":{},"Configuration":{"type":"structure","required":["AcceptanceThreshold"],"members":{"AcceptanceThreshold":{"type":"integer"}}},"CustomerSpeakerId":{"shape":"S1e"},"Decision":{},"GeneratedSpeakerId":{},"Score":{"type":"integer"}}},"DomainId":{},"FraudDetectionResult":{"type":"structure","members":{"AudioAggregationEndedAt":{"type":"timestamp"},"AudioAggregationStartedAt":{"type":"timestamp"},"Configuration":{"type":"structure","required":["RiskThreshold"],"members":{"RiskThreshold":{"type":"integer"}}},"Decision":{},"FraudDetectionResultId":{},"Reasons":{"type":"list","member":{}},"RiskDetails":{"type":"structure","required":["KnownFraudsterRisk"],"members":{"KnownFraudsterRisk":{"type":"structure","required":["RiskScore"],"members":{"GeneratedFraudsterId":{},"RiskScore":{"type":"integer"}}}}}}},"SessionId":{},"SessionName":{},"StreamingStatus":{}}}},"ListDomains":{"input":{"type":"structure","members":{"MaxResults":{"type":"integer"},"NextToken":{}}},"output":{"type":"structure","members":{"DomainSummaries":{"type":"list","member":{"type":"structure","members":{"Arn":{},"CreatedAt":{"type":"timestamp"},"Description":{"shape":"S3"},"DomainId":{},"DomainStatus":{},"Name":{"shape":"S4"},"ServerSideEncryptionConfiguration":{"shape":"S5"},"ServerSideEncryptionUpdateDetails":{"shape":"Sh"},"UpdatedAt":{"type":"timestamp"}}}},"NextToken":{}}}},"ListFraudsterRegistrationJobs":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{},"JobStatus":{},"MaxResults":{"type":"integer"},"NextToken":{}}},"output":{"type":"structure","members":{"JobSummaries":{"type":"list","member":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DomainId":{},"EndedAt":{"type":"timestamp"},"FailureDetails":{"shape":"S10"},"JobId":{},"JobName":{"shape":"S14"},"JobProgress":{"shape":"S15"},"JobStatus":{}}}},"NextToken":{}}}},"ListSpeakerEnrollmentJobs":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{},"JobStatus":{},"MaxResults":{"type":"integer"},"NextToken":{}}},"output":{"type":"structure","members":{"JobSummaries":{"type":"list","member":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DomainId":{},"EndedAt":{"type":"timestamp"},"FailureDetails":{"shape":"S10"},"JobId":{},"JobName":{"shape":"S14"},"JobProgress":{"shape":"S15"},"JobStatus":{}}}},"NextToken":{}}}},"ListSpeakers":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{},"MaxResults":{"type":"integer"},"NextToken":{}}},"output":{"type":"structure","members":{"NextToken":{},"SpeakerSummaries":{"type":"list","member":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"CustomerSpeakerId":{"shape":"S1e"},"DomainId":{},"GeneratedSpeakerId":{},"LastAccessedAt":{"type":"timestamp"},"Status":{},"UpdatedAt":{"type":"timestamp"}}}}}}},"ListTagsForResource":{"input":{"type":"structure","required":["ResourceArn"],"members":{"ResourceArn":{}}},"output":{"type":"structure","members":{"Tags":{"shape":"S7"}}}},"OptOutSpeaker":{"input":{"type":"structure","required":["DomainId","SpeakerId"],"members":{"DomainId":{},"SpeakerId":{"shape":"So"}}},"output":{"type":"structure","members":{"Speaker":{"shape":"S1d"}}}},"StartFraudsterRegistrationJob":{"input":{"type":"structure","required":["DataAccessRoleArn","DomainId","InputDataConfig","OutputDataConfig"],"members":{"ClientToken":{"idempotencyToken":true},"DataAccessRoleArn":{},"DomainId":{},"InputDataConfig":{"shape":"S12"},"JobName":{"shape":"S14"},"OutputDataConfig":{"shape":"S18"},"RegistrationConfig":{"shape":"S19"}}},"output":{"type":"structure","members":{"Job":{"shape":"Sy"}}},"idempotent":true},"StartSpeakerEnrollmentJob":{"input":{"type":"structure","required":["DataAccessRoleArn","DomainId","InputDataConfig","OutputDataConfig"],"members":{"ClientToken":{"idempotencyToken":true},"DataAccessRoleArn":{},"DomainId":{},"EnrollmentConfig":{"shape":"S1k"},"InputDataConfig":{"shape":"S12"},"JobName":{"shape":"S14"},"OutputDataConfig":{"shape":"S18"}}},"output":{"type":"structure","members":{"Job":{"shape":"S1j"}}},"idempotent":true},"TagResource":{"input":{"type":"structure","required":["ResourceArn","Tags"],"members":{"ResourceArn":{},"Tags":{"shape":"S7"}}},"output":{"type":"structure","members":{}}},"UntagResource":{"input":{"type":"structure","required":["ResourceArn","TagKeys"],"members":{"ResourceArn":{},"TagKeys":{"type":"list","member":{"shape":"S9"}}}},"output":{"type":"structure","members":{}}},"UpdateDomain":{"input":{"type":"structure","required":["DomainId","Name","ServerSideEncryptionConfiguration"],"members":{"Description":{"shape":"S3"},"DomainId":{},"Name":{"shape":"S4"},"ServerSideEncryptionConfiguration":{"shape":"S5"}}},"output":{"type":"structure","members":{"Domain":{"shape":"Sc"}}}}},"shapes":{"S3":{"type":"string","sensitive":true},"S4":{"type":"string","sensitive":true},"S5":{"type":"structure","required":["KmsKeyId"],"members":{"KmsKeyId":{}}},"S7":{"type":"list","member":{"type":"structure","required":["Key","Value"],"members":{"Key":{"shape":"S9"},"Value":{"type":"string","sensitive":true}}}},"S9":{"type":"string","sensitive":true},"Sc":{"type":"structure","members":{"Arn":{},"CreatedAt":{"type":"timestamp"},"Description":{"shape":"S3"},"DomainId":{},"DomainStatus":{},"Name":{"shape":"S4"},"ServerSideEncryptionConfiguration":{"shape":"S5"},"ServerSideEncryptionUpdateDetails":{"shape":"Sh"},"UpdatedAt":{"type":"timestamp"}}},"Sh":{"type":"structure","members":{"Message":{},"OldKmsKeyId":{},"UpdateStatus":{}}},"Sm":{"type":"string","sensitive":true},"So":{"type":"string","sensitive":true},"Sy":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DataAccessRoleArn":{},"DomainId":{},"EndedAt":{"type":"timestamp"},"FailureDetails":{"shape":"S10"},"InputDataConfig":{"shape":"S12"},"JobId":{},"JobName":{"shape":"S14"},"JobProgress":{"shape":"S15"},"JobStatus":{},"OutputDataConfig":{"shape":"S18"},"RegistrationConfig":{"shape":"S19"}}},"S10":{"type":"structure","members":{"Message":{},"StatusCode":{"type":"integer"}}},"S12":{"type":"structure","required":["S3Uri"],"members":{"S3Uri":{}}},"S14":{"type":"string","sensitive":true},"S15":{"type":"structure","members":{"PercentComplete":{"type":"integer"}}},"S18":{"type":"structure","required":["S3Uri"],"members":{"KmsKeyId":{},"S3Uri":{}}},"S19":{"type":"structure","members":{"DuplicateRegistrationAction":{},"FraudsterSimilarityThreshold":{"type":"integer"}}},"S1d":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"CustomerSpeakerId":{"shape":"S1e"},"DomainId":{},"GeneratedSpeakerId":{},"LastAccessedAt":{"type":"timestamp"},"Status":{},"UpdatedAt":{"type":"timestamp"}}},"S1e":{"type":"string","sensitive":true},"S1j":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DataAccessRoleArn":{},"DomainId":{},"EndedAt":{"type":"timestamp"},"EnrollmentConfig":{"shape":"S1k"},"FailureDetails":{"shape":"S10"},"InputDataConfig":{"shape":"S12"},"JobId":{},"JobName":{"shape":"S14"},"JobProgress":{"shape":"S15"},"JobStatus":{},"OutputDataConfig":{"shape":"S18"}}},"S1k":{"type":"structure","members":{"ExistingEnrollmentAction":{},"FraudDetectionConfig":{"type":"structure","members":{"FraudDetectionAction":{},"RiskThreshold":{"type":"integer"}}}}}}}
59416
+ module.exports = {"version":"2.0","metadata":{"apiVersion":"2021-09-27","endpointPrefix":"voiceid","jsonVersion":"1.0","protocol":"json","serviceFullName":"Amazon Voice ID","serviceId":"Voice ID","signatureVersion":"v4","signingName":"voiceid","targetPrefix":"VoiceID","uid":"voice-id-2021-09-27"},"operations":{"CreateDomain":{"input":{"type":"structure","required":["Name","ServerSideEncryptionConfiguration"],"members":{"ClientToken":{"idempotencyToken":true},"Description":{"shape":"S3"},"Name":{"shape":"S4"},"ServerSideEncryptionConfiguration":{"shape":"S5"},"Tags":{"shape":"S7"}}},"output":{"type":"structure","members":{"Domain":{"shape":"Sc"}}},"idempotent":true},"DeleteDomain":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{}}},"idempotent":true},"DeleteFraudster":{"input":{"type":"structure","required":["DomainId","FraudsterId"],"members":{"DomainId":{},"FraudsterId":{"shape":"Sm"}}}},"DeleteSpeaker":{"input":{"type":"structure","required":["DomainId","SpeakerId"],"members":{"DomainId":{},"SpeakerId":{"shape":"So"}}}},"DescribeDomain":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{}}},"output":{"type":"structure","members":{"Domain":{"shape":"Sc"}}}},"DescribeFraudster":{"input":{"type":"structure","required":["DomainId","FraudsterId"],"members":{"DomainId":{},"FraudsterId":{"shape":"Sm"}}},"output":{"type":"structure","members":{"Fraudster":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DomainId":{},"GeneratedFraudsterId":{}}}}}},"DescribeFraudsterRegistrationJob":{"input":{"type":"structure","required":["DomainId","JobId"],"members":{"DomainId":{},"JobId":{}}},"output":{"type":"structure","members":{"Job":{"shape":"Sy"}}}},"DescribeSpeaker":{"input":{"type":"structure","required":["DomainId","SpeakerId"],"members":{"DomainId":{},"SpeakerId":{"shape":"So"}}},"output":{"type":"structure","members":{"Speaker":{"shape":"S1d"}}}},"DescribeSpeakerEnrollmentJob":{"input":{"type":"structure","required":["DomainId","JobId"],"members":{"DomainId":{},"JobId":{}}},"output":{"type":"structure","members":{"Job":{"shape":"S1j"}}}},"EvaluateSession":{"input":{"type":"structure","required":["DomainId","SessionNameOrId"],"members":{"DomainId":{},"SessionNameOrId":{}}},"output":{"type":"structure","members":{"AuthenticationResult":{"type":"structure","members":{"AudioAggregationEndedAt":{"type":"timestamp"},"AudioAggregationStartedAt":{"type":"timestamp"},"AuthenticationResultId":{},"Configuration":{"type":"structure","required":["AcceptanceThreshold"],"members":{"AcceptanceThreshold":{"type":"integer"}}},"CustomerSpeakerId":{"shape":"S1e"},"Decision":{},"GeneratedSpeakerId":{},"Score":{"type":"integer"}}},"DomainId":{},"FraudDetectionResult":{"type":"structure","members":{"AudioAggregationEndedAt":{"type":"timestamp"},"AudioAggregationStartedAt":{"type":"timestamp"},"Configuration":{"type":"structure","required":["RiskThreshold"],"members":{"RiskThreshold":{"type":"integer"}}},"Decision":{},"FraudDetectionResultId":{},"Reasons":{"type":"list","member":{}},"RiskDetails":{"type":"structure","required":["KnownFraudsterRisk","VoiceSpoofingRisk"],"members":{"KnownFraudsterRisk":{"type":"structure","required":["RiskScore"],"members":{"GeneratedFraudsterId":{},"RiskScore":{"type":"integer"}}},"VoiceSpoofingRisk":{"type":"structure","required":["RiskScore"],"members":{"RiskScore":{"type":"integer"}}}}}}},"SessionId":{},"SessionName":{},"StreamingStatus":{}}}},"ListDomains":{"input":{"type":"structure","members":{"MaxResults":{"type":"integer"},"NextToken":{}}},"output":{"type":"structure","members":{"DomainSummaries":{"type":"list","member":{"type":"structure","members":{"Arn":{},"CreatedAt":{"type":"timestamp"},"Description":{"shape":"S3"},"DomainId":{},"DomainStatus":{},"Name":{"shape":"S4"},"ServerSideEncryptionConfiguration":{"shape":"S5"},"ServerSideEncryptionUpdateDetails":{"shape":"Sh"},"UpdatedAt":{"type":"timestamp"}}}},"NextToken":{}}}},"ListFraudsterRegistrationJobs":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{},"JobStatus":{},"MaxResults":{"type":"integer"},"NextToken":{}}},"output":{"type":"structure","members":{"JobSummaries":{"type":"list","member":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DomainId":{},"EndedAt":{"type":"timestamp"},"FailureDetails":{"shape":"S10"},"JobId":{},"JobName":{"shape":"S14"},"JobProgress":{"shape":"S15"},"JobStatus":{}}}},"NextToken":{}}}},"ListSpeakerEnrollmentJobs":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{},"JobStatus":{},"MaxResults":{"type":"integer"},"NextToken":{}}},"output":{"type":"structure","members":{"JobSummaries":{"type":"list","member":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DomainId":{},"EndedAt":{"type":"timestamp"},"FailureDetails":{"shape":"S10"},"JobId":{},"JobName":{"shape":"S14"},"JobProgress":{"shape":"S15"},"JobStatus":{}}}},"NextToken":{}}}},"ListSpeakers":{"input":{"type":"structure","required":["DomainId"],"members":{"DomainId":{},"MaxResults":{"type":"integer"},"NextToken":{}}},"output":{"type":"structure","members":{"NextToken":{},"SpeakerSummaries":{"type":"list","member":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"CustomerSpeakerId":{"shape":"S1e"},"DomainId":{},"GeneratedSpeakerId":{},"LastAccessedAt":{"type":"timestamp"},"Status":{},"UpdatedAt":{"type":"timestamp"}}}}}}},"ListTagsForResource":{"input":{"type":"structure","required":["ResourceArn"],"members":{"ResourceArn":{}}},"output":{"type":"structure","members":{"Tags":{"shape":"S7"}}}},"OptOutSpeaker":{"input":{"type":"structure","required":["DomainId","SpeakerId"],"members":{"DomainId":{},"SpeakerId":{"shape":"So"}}},"output":{"type":"structure","members":{"Speaker":{"shape":"S1d"}}}},"StartFraudsterRegistrationJob":{"input":{"type":"structure","required":["DataAccessRoleArn","DomainId","InputDataConfig","OutputDataConfig"],"members":{"ClientToken":{"idempotencyToken":true},"DataAccessRoleArn":{},"DomainId":{},"InputDataConfig":{"shape":"S12"},"JobName":{"shape":"S14"},"OutputDataConfig":{"shape":"S18"},"RegistrationConfig":{"shape":"S19"}}},"output":{"type":"structure","members":{"Job":{"shape":"Sy"}}},"idempotent":true},"StartSpeakerEnrollmentJob":{"input":{"type":"structure","required":["DataAccessRoleArn","DomainId","InputDataConfig","OutputDataConfig"],"members":{"ClientToken":{"idempotencyToken":true},"DataAccessRoleArn":{},"DomainId":{},"EnrollmentConfig":{"shape":"S1k"},"InputDataConfig":{"shape":"S12"},"JobName":{"shape":"S14"},"OutputDataConfig":{"shape":"S18"}}},"output":{"type":"structure","members":{"Job":{"shape":"S1j"}}},"idempotent":true},"TagResource":{"input":{"type":"structure","required":["ResourceArn","Tags"],"members":{"ResourceArn":{},"Tags":{"shape":"S7"}}},"output":{"type":"structure","members":{}}},"UntagResource":{"input":{"type":"structure","required":["ResourceArn","TagKeys"],"members":{"ResourceArn":{},"TagKeys":{"type":"list","member":{"shape":"S9"}}}},"output":{"type":"structure","members":{}}},"UpdateDomain":{"input":{"type":"structure","required":["DomainId","Name","ServerSideEncryptionConfiguration"],"members":{"Description":{"shape":"S3"},"DomainId":{},"Name":{"shape":"S4"},"ServerSideEncryptionConfiguration":{"shape":"S5"}}},"output":{"type":"structure","members":{"Domain":{"shape":"Sc"}}}}},"shapes":{"S3":{"type":"string","sensitive":true},"S4":{"type":"string","sensitive":true},"S5":{"type":"structure","required":["KmsKeyId"],"members":{"KmsKeyId":{}}},"S7":{"type":"list","member":{"type":"structure","required":["Key","Value"],"members":{"Key":{"shape":"S9"},"Value":{"type":"string","sensitive":true}}}},"S9":{"type":"string","sensitive":true},"Sc":{"type":"structure","members":{"Arn":{},"CreatedAt":{"type":"timestamp"},"Description":{"shape":"S3"},"DomainId":{},"DomainStatus":{},"Name":{"shape":"S4"},"ServerSideEncryptionConfiguration":{"shape":"S5"},"ServerSideEncryptionUpdateDetails":{"shape":"Sh"},"UpdatedAt":{"type":"timestamp"}}},"Sh":{"type":"structure","members":{"Message":{},"OldKmsKeyId":{},"UpdateStatus":{}}},"Sm":{"type":"string","sensitive":true},"So":{"type":"string","sensitive":true},"Sy":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DataAccessRoleArn":{},"DomainId":{},"EndedAt":{"type":"timestamp"},"FailureDetails":{"shape":"S10"},"InputDataConfig":{"shape":"S12"},"JobId":{},"JobName":{"shape":"S14"},"JobProgress":{"shape":"S15"},"JobStatus":{},"OutputDataConfig":{"shape":"S18"},"RegistrationConfig":{"shape":"S19"}}},"S10":{"type":"structure","members":{"Message":{},"StatusCode":{"type":"integer"}}},"S12":{"type":"structure","required":["S3Uri"],"members":{"S3Uri":{}}},"S14":{"type":"string","sensitive":true},"S15":{"type":"structure","members":{"PercentComplete":{"type":"integer"}}},"S18":{"type":"structure","required":["S3Uri"],"members":{"KmsKeyId":{},"S3Uri":{}}},"S19":{"type":"structure","members":{"DuplicateRegistrationAction":{},"FraudsterSimilarityThreshold":{"type":"integer"}}},"S1d":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"CustomerSpeakerId":{"shape":"S1e"},"DomainId":{},"GeneratedSpeakerId":{},"LastAccessedAt":{"type":"timestamp"},"Status":{},"UpdatedAt":{"type":"timestamp"}}},"S1e":{"type":"string","sensitive":true},"S1j":{"type":"structure","members":{"CreatedAt":{"type":"timestamp"},"DataAccessRoleArn":{},"DomainId":{},"EndedAt":{"type":"timestamp"},"EnrollmentConfig":{"shape":"S1k"},"FailureDetails":{"shape":"S10"},"InputDataConfig":{"shape":"S12"},"JobId":{},"JobName":{"shape":"S14"},"JobProgress":{"shape":"S15"},"JobStatus":{},"OutputDataConfig":{"shape":"S18"}}},"S1k":{"type":"structure","members":{"ExistingEnrollmentAction":{},"FraudDetectionConfig":{"type":"structure","members":{"FraudDetectionAction":{},"RiskThreshold":{"type":"integer"}}}}}}}
59417
59417
 
59418
59418
  /***/ }),
59419
59419
  /* 1089 */
@@ -1,4 +1,4 @@
1
- // AWS SDK for JavaScript v2.1204.0
1
+ // AWS SDK for JavaScript v2.1205.0
2
2
  // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3
3
  // License at https://sdk.amazonaws.com/js/BUNDLE_LICENSE.txt
4
4
  (function(){function r(e,n,t){function o(i,f){if(!n[i]){if(!e[i]){var c="function"==typeof require&&require;if(!f&&c)return c(i,!0);if(u)return u(i,!0);var a=new Error("Cannot find module '"+i+"'");throw a.code="MODULE_NOT_FOUND",a}var p=n[i]={exports:{}};e[i][0].call(p.exports,function(r){var n=e[i][1][r];return o(n||r)},p,p.exports,r,e,n,t)}return n[i].exports}for(var u="function"==typeof require&&require,i=0;i<t.length;i++)o(t[i]);return o}return r})()({1:[function(require,module,exports){
@@ -242387,7 +242387,7 @@ AWS.util.update(AWS, {
242387
242387
  /**
242388
242388
  * @constant
242389
242389
  */
242390
- VERSION: '2.1204.0',
242390
+ VERSION: '2.1205.0',
242391
242391
 
242392
242392
  /**
242393
242393
  * @api private
@@ -264371,7 +264371,7 @@ var LRUCache = /** @class */ (function () {
264371
264371
  }());
264372
264372
  exports.LRUCache = LRUCache;
264373
264373
  },{}],458:[function(require,module,exports){
264374
- // AWS SDK for JavaScript v2.1204.0
264374
+ // AWS SDK for JavaScript v2.1205.0
264375
264375
  // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
264376
264376
  // License at https://sdk.amazonaws.com/js/BUNDLE_LICENSE.txt
264377
264377
  require('./browser_loader');