Skip to content

Commit f55b6af

Browse files
author
awstools
committed
feat(client-bedrock-agent-runtime): This release adds support for using Guardrails with Bedrock Agents.
1 parent b624d0d commit f55b6af

File tree

4 files changed

+1428
-0
lines changed

4 files changed

+1428
-0
lines changed

Diff for: clients/client-bedrock-agent-runtime/src/commands/InvokeAgentCommand.ts

+112
Original file line numberDiff line numberDiff line change
@@ -162,6 +162,118 @@ export interface InvokeAgentCommandOutput extends InvokeAgentResponse, __Metadat
162162
* // sessionId: "STRING_VALUE",
163163
* // agentVersion: "STRING_VALUE",
164164
* // trace: { // Trace Union: only one key present
165+
* // guardrailTrace: { // GuardrailTrace
166+
* // action: "INTERVENED" || "NONE",
167+
* // traceId: "STRING_VALUE",
168+
* // inputAssessments: [ // GuardrailAssessmentList
169+
* // { // GuardrailAssessment
170+
* // topicPolicy: { // GuardrailTopicPolicyAssessment
171+
* // topics: [ // GuardrailTopicList
172+
* // { // GuardrailTopic
173+
* // name: "STRING_VALUE",
174+
* // type: "DENY",
175+
* // action: "BLOCKED",
176+
* // },
177+
* // ],
178+
* // },
179+
* // contentPolicy: { // GuardrailContentPolicyAssessment
180+
* // filters: [ // GuardrailContentFilterList
181+
* // { // GuardrailContentFilter
182+
* // type: "INSULTS" || "HATE" || "SEXUAL" || "VIOLENCE" || "MISCONDUCT" || "PROMPT_ATTACK",
183+
* // confidence: "NONE" || "LOW" || "MEDIUM" || "HIGH",
184+
* // action: "BLOCKED",
185+
* // },
186+
* // ],
187+
* // },
188+
* // wordPolicy: { // GuardrailWordPolicyAssessment
189+
* // customWords: [ // GuardrailCustomWordList
190+
* // { // GuardrailCustomWord
191+
* // match: "STRING_VALUE",
192+
* // action: "BLOCKED",
193+
* // },
194+
* // ],
195+
* // managedWordLists: [ // GuardrailManagedWordList
196+
* // { // GuardrailManagedWord
197+
* // match: "STRING_VALUE",
198+
* // type: "PROFANITY",
199+
* // action: "BLOCKED",
200+
* // },
201+
* // ],
202+
* // },
203+
* // sensitiveInformationPolicy: { // GuardrailSensitiveInformationPolicyAssessment
204+
* // piiEntities: [ // GuardrailPiiEntityFilterList
205+
* // { // GuardrailPiiEntityFilter
206+
* // type: "ADDRESS" || "AGE" || "AWS_ACCESS_KEY" || "AWS_SECRET_KEY" || "CA_HEALTH_NUMBER" || "CA_SOCIAL_INSURANCE_NUMBER" || "CREDIT_DEBIT_CARD_CVV" || "CREDIT_DEBIT_CARD_EXPIRY" || "CREDIT_DEBIT_CARD_NUMBER" || "DRIVER_ID" || "EMAIL" || "INTERNATIONAL_BANK_ACCOUNT_NUMBER" || "IP_ADDRESS" || "LICENSE_PLATE" || "MAC_ADDRESS" || "NAME" || "PASSWORD" || "PHONE" || "PIN" || "SWIFT_CODE" || "UK_NATIONAL_HEALTH_SERVICE_NUMBER" || "UK_NATIONAL_INSURANCE_NUMBER" || "UK_UNIQUE_TAXPAYER_REFERENCE_NUMBER" || "URL" || "USERNAME" || "US_BANK_ACCOUNT_NUMBER" || "US_BANK_ROUTING_NUMBER" || "US_INDIVIDUAL_TAX_IDENTIFICATION_NUMBER" || "US_PASSPORT_NUMBER" || "US_SOCIAL_SECURITY_NUMBER" || "VEHICLE_IDENTIFICATION_NUMBER",
207+
* // match: "STRING_VALUE",
208+
* // action: "BLOCKED" || "ANONYMIZED",
209+
* // },
210+
* // ],
211+
* // regexes: [ // GuardrailRegexFilterList
212+
* // { // GuardrailRegexFilter
213+
* // name: "STRING_VALUE",
214+
* // regex: "STRING_VALUE",
215+
* // match: "STRING_VALUE",
216+
* // action: "BLOCKED" || "ANONYMIZED",
217+
* // },
218+
* // ],
219+
* // },
220+
* // },
221+
* // ],
222+
* // outputAssessments: [
223+
* // {
224+
* // topicPolicy: {
225+
* // topics: [
226+
* // {
227+
* // name: "STRING_VALUE",
228+
* // type: "DENY",
229+
* // action: "BLOCKED",
230+
* // },
231+
* // ],
232+
* // },
233+
* // contentPolicy: {
234+
* // filters: [
235+
* // {
236+
* // type: "INSULTS" || "HATE" || "SEXUAL" || "VIOLENCE" || "MISCONDUCT" || "PROMPT_ATTACK",
237+
* // confidence: "NONE" || "LOW" || "MEDIUM" || "HIGH",
238+
* // action: "BLOCKED",
239+
* // },
240+
* // ],
241+
* // },
242+
* // wordPolicy: {
243+
* // customWords: [
244+
* // {
245+
* // match: "STRING_VALUE",
246+
* // action: "BLOCKED",
247+
* // },
248+
* // ],
249+
* // managedWordLists: [
250+
* // {
251+
* // match: "STRING_VALUE",
252+
* // type: "PROFANITY",
253+
* // action: "BLOCKED",
254+
* // },
255+
* // ],
256+
* // },
257+
* // sensitiveInformationPolicy: {
258+
* // piiEntities: [
259+
* // {
260+
* // type: "ADDRESS" || "AGE" || "AWS_ACCESS_KEY" || "AWS_SECRET_KEY" || "CA_HEALTH_NUMBER" || "CA_SOCIAL_INSURANCE_NUMBER" || "CREDIT_DEBIT_CARD_CVV" || "CREDIT_DEBIT_CARD_EXPIRY" || "CREDIT_DEBIT_CARD_NUMBER" || "DRIVER_ID" || "EMAIL" || "INTERNATIONAL_BANK_ACCOUNT_NUMBER" || "IP_ADDRESS" || "LICENSE_PLATE" || "MAC_ADDRESS" || "NAME" || "PASSWORD" || "PHONE" || "PIN" || "SWIFT_CODE" || "UK_NATIONAL_HEALTH_SERVICE_NUMBER" || "UK_NATIONAL_INSURANCE_NUMBER" || "UK_UNIQUE_TAXPAYER_REFERENCE_NUMBER" || "URL" || "USERNAME" || "US_BANK_ACCOUNT_NUMBER" || "US_BANK_ROUTING_NUMBER" || "US_INDIVIDUAL_TAX_IDENTIFICATION_NUMBER" || "US_PASSPORT_NUMBER" || "US_SOCIAL_SECURITY_NUMBER" || "VEHICLE_IDENTIFICATION_NUMBER",
261+
* // match: "STRING_VALUE",
262+
* // action: "BLOCKED" || "ANONYMIZED",
263+
* // },
264+
* // ],
265+
* // regexes: [
266+
* // {
267+
* // name: "STRING_VALUE",
268+
* // regex: "STRING_VALUE",
269+
* // match: "STRING_VALUE",
270+
* // action: "BLOCKED" || "ANONYMIZED",
271+
* // },
272+
* // ],
273+
* // },
274+
* // },
275+
* // ],
276+
* // },
165277
* // preProcessingTrace: { // PreProcessingTrace Union: only one key present
166278
* // modelInvocationInput: { // ModelInvocationInput
167279
* // traceId: "STRING_VALUE",

0 commit comments

Comments
 (0)