Skip to content

Conversation

go-to-k
Copy link
Contributor

@go-to-k go-to-k commented Feb 11, 2025

Issue # (if applicable)

Closes #33377.

Reason for this change

AWS CodePipeline introduces new build action: InspectorScan action.

Description of changes

Add InspectorEcrImageScanAction and InspectorSourceCodeScanAction classes that extends BaseInspectorScan class.

The BaseInspectorScan class that extends Action class to aws-codepipeline-actions module.

Describe any new or updated permissions being added

Description of how you validated changes

Both unit and integ tests

Checklist


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

@aws-cdk-automation aws-cdk-automation requested a review from a team February 11, 2025 08:00
@github-actions github-actions bot added feature-request A feature should be added or improved. p2 distinguished-contributor [Pilot] contributed 50+ PRs to the CDK labels Feb 11, 2025
Copy link
Collaborator

@aws-cdk-automation aws-cdk-automation left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(This review is outdated)

Copy link

codecov bot commented Feb 11, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 83.98%. Comparing base (3154d01) to head (231c074).

Additional details and impacted files
@@           Coverage Diff           @@
##             main   #33378   +/-   ##
=======================================
  Coverage   83.98%   83.98%           
=======================================
  Files         120      120           
  Lines        6976     6976           
  Branches     1178     1178           
=======================================
  Hits         5859     5859           
  Misses       1005     1005           
  Partials      112      112           
Flag Coverage Δ
suite.unit 83.98% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

Components Coverage Δ
packages/aws-cdk ∅ <ø> (∅)
packages/aws-cdk-lib/core 83.98% <ø> (ø)
🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@go-to-k go-to-k changed the title feat(codepipeline-actions): support InspectorScan invoke action feat(codepipeline-actions): support InspectorScan action Feb 11, 2025
@go-to-k go-to-k changed the title feat(codepipeline-actions): support InspectorScan action feat(codepipeline-actions): support EcrImageScanAction and SourceCodeScanAction action Feb 11, 2025
@go-to-k go-to-k changed the title feat(codepipeline-actions): support EcrImageScanAction and SourceCodeScanAction action feat(codepipeline-actions): support EcrImageScanAction and SourceCodeScanAction actions Feb 11, 2025
@go-to-k go-to-k changed the title feat(codepipeline-actions): support EcrImageScanAction and SourceCodeScanAction actions feat(codepipeline-actions): support InspectorEcrImageScanAction and InspectorSourceCodeScanAction actions Feb 11, 2025
@github-actions github-actions bot added the effort/medium Medium work item – several days of effort label Feb 14, 2025
Comment on lines +97 to +107
test('can get variables', () => {
// WHEN
const inspectorEcrImageScanAction = new cpactions.InspectorEcrImageScanAction({
actionName: 'InspectorScan',
output: scanOutput,
repository,
});

// THEN
expect(inspectorEcrImageScanAction.variables.highestScannedSeverity).toMatch(/^#{\${Token\[TOKEN\.[0-9]*\]}.HighestScannedSeverity}$/);
});
Copy link
Contributor Author

@go-to-k go-to-k Feb 14, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This and other common code are about the common behavior of the base class.

But as users are not aware of the base class because they call the subclasses directly, and in case there are any changes by contributors, it is also confirmation for regressions in the subclasses. Therefore, the tests in inspector-ecr-image-scan-action.test.ts and inspector-source-code-scan-action.test.ts are partially identical.
This also makes the test useful even if the base class is deleted and each class is implemented independently in the future.

5d
5d previously approved these changes Apr 1, 2025
Copy link
Member

@5d 5d left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@5d
Copy link
Member

5d commented Apr 1, 2025

Great work! 👍 Thanks

@aws-cdk-automation aws-cdk-automation removed the pr/needs-community-review This PR needs a review from a Trusted Community Member or Core Team Member. label Apr 1, 2025
@go-to-k
Copy link
Contributor Author

go-to-k commented Apr 1, 2025

@Mergifyio update

Copy link
Contributor

mergify bot commented Apr 1, 2025

update

❌ Mergify doesn't have permission to update

For security reasons, Mergify can't update this pull request. Try updating locally.
GitHub response: refusing to allow a GitHub App to create or update workflow .github/workflows/README.md without workflows permission

@go-to-k
Copy link
Contributor Author

go-to-k commented Apr 1, 2025

@5d
Thanks for your approval!

But the merge process doesn't seem to be running. Could you please address this?

@shikha372
Copy link
Contributor

@Mergifyio update

Copy link
Contributor

mergify bot commented Apr 1, 2025

update

❌ Mergify doesn't have permission to update

For security reasons, Mergify can't update this pull request. Try updating locally.
GitHub response: refusing to allow a GitHub App to create or update workflow .github/workflows/README.md without workflows permission

@aws-cdk-automation aws-cdk-automation dismissed their stale review April 2, 2025 10:54

✅ Updated pull request passes all PRLinter validations. Dismissing previous PRLinter review.

@mergify mergify bot dismissed 5d’s stale review April 2, 2025 11:04

Pull request has been modified.

@aws-cdk-automation aws-cdk-automation added the pr/needs-community-review This PR needs a review from a Trusted Community Member or Core Team Member. label Apr 2, 2025
@go-to-k
Copy link
Contributor Author

go-to-k commented Apr 2, 2025

@5d @shikha372

I updated the branch locally to address the mergify error.

In addition, the following changes were made:

  • The link on the cp-action's reference page seems to have changed in the last few days, so I changed that as well.
  • The already existing method for ecr:GetAuthorizationToken is now used.
  • A vulnerability was found in the Dockerfile for the integ test and the scan failed, so the threshold in the test was changed to avoid the error.
  • Since the feature flag (@aws-cdk/pipelines:reduceStageRoleTrustScope) was introduced in this PR, changes to the snapshot occur unless specified in the integ tests. So specified the flag in the integ tests.

Could you please check it again and merge it if you are okay?

Copy link
Member

@5d 5d left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Contributor

mergify bot commented Apr 2, 2025

Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@aws-cdk-automation aws-cdk-automation removed the pr/needs-community-review This PR needs a review from a Trusted Community Member or Core Team Member. label Apr 2, 2025
Copy link
Contributor

mergify bot commented Apr 2, 2025

Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@aws-cdk-automation
Copy link
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildv2Project1C6BFA3F-wQm2hXv2jqQv
  • Commit ID: 231c074
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

@mergify mergify bot merged commit 2dc8cc7 into aws:main Apr 2, 2025
20 checks passed
Copy link
Contributor

mergify bot commented Apr 2, 2025

Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

Copy link
Contributor

github-actions bot commented Apr 2, 2025

Comments on closed issues and PRs are hard for our team to see.
If you need help, please open a new issue that references this one.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Apr 2, 2025
@go-to-k go-to-k deleted the cp-actions-inspector-scan branch April 3, 2025 01:11
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
distinguished-contributor [Pilot] contributed 50+ PRs to the CDK effort/medium Medium work item – several days of effort feature-request A feature should be added or improved. p2 pr-linter/exemption-requested The contributor has requested an exemption to the PR Linter feedback.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

codepipeline-actions: support InspectorScan action
4 participants