Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(bootstrap): remove Security Hub finding ECR.3 #24723

Closed
1 of 2 tasks
tenjaa opened this issue Mar 21, 2023 · 3 comments · Fixed by #24735
Closed
1 of 2 tasks

(bootstrap): remove Security Hub finding ECR.3 #24723

tenjaa opened this issue Mar 21, 2023 · 3 comments · Fixed by #24735
Labels
effort/small Small work item – less than a day of effort feature-request A feature should be added or improved. p2 package/tools Related to AWS CDK Tools or CLI

Comments

@tenjaa
Copy link
Contributor

tenjaa commented Mar 21, 2023

Describe the feature

Similar to #24175 I would like to see a lifecycle rule that does not do much but at least per default resolves the finding.

I know that there is an RFC for garbage collection in the works.

Use Case

After enabling AWS Foundational Security Best Practices v1.0.0 in the security hub,
I am always frustrated when I see failed checks.

Proposed Solution

Similar to #24175 just a a LifecyclePolicy to the repository:

      LifecyclePolicy:
        LifecyclePolicyText: |
          {
            "rules": [
              {
                "rulePriority": 1,
                "description": "no-op",
                "selection": {
                  "tagStatus": "untagged",
                  "countType": "sinceImagePushed",
                  "countUnit": "days",
                  "countNumber": 365
                },
                "action": { "type": "expire" }
              }
            ]
          }

Other Information

No response

Acknowledgements

  • I may be able to implement this feature request
  • This feature might incur a breaking change

CDK version used

latest

Environment details (OS name and version, etc.)

@tenjaa tenjaa added feature-request A feature should be added or improved. needs-triage This issue or PR still needs to be triaged. labels Mar 21, 2023
@github-actions github-actions bot added the package/tools Related to AWS CDK Tools or CLI label Mar 21, 2023
@pahud
Copy link
Contributor

pahud commented Mar 21, 2023

Thank you for the details and we are looking forward to your pull request.

@pahud pahud added effort/small Small work item – less than a day of effort p2 and removed needs-triage This issue or PR still needs to be triaged. labels Mar 21, 2023
@tenjaa
Copy link
Contributor Author

tenjaa commented Mar 22, 2023

Thanks for the quick feedback. I added the pull request @pahud

@mergify mergify bot closed this as completed in #24735 Mar 28, 2023
mergify bot pushed a commit that referenced this issue Mar 28, 2023
…because of missing lifecycle policy (#24735)

After enabling AWS Foundational Security Best Practices v1.0.0 in the security hub,
I am always frustrated when I see failed checks.

Similar to #24175 I would like to see a lifecycle rule that does not do much but at least per default resolves the finding.

I know that there is an RFC for garbage collection in the works but this is a simple immediate fix.

_This is heavily inspired by https://github.com/aws/aws-cdk/pull/24175_

Closes #24723.

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
@github-actions
Copy link

⚠️COMMENT VISIBILITY WARNING⚠️

Comments on closed issues are hard for our team to see.
If you need more assistance, please either tag a team member or open a new issue that references this one.
If you wish to keep having a conversation with other community members under this issue feel free to do so.

homakk pushed a commit to homakk/aws-cdk that referenced this issue Mar 28, 2023
…because of missing lifecycle policy (aws#24735)

After enabling AWS Foundational Security Best Practices v1.0.0 in the security hub,
I am always frustrated when I see failed checks.

Similar to aws#24175 I would like to see a lifecycle rule that does not do much but at least per default resolves the finding.

I know that there is an RFC for garbage collection in the works but this is a simple immediate fix.

_This is heavily inspired by https://github.com/aws/aws-cdk/pull/24175_

Closes aws#24723.

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
effort/small Small work item – less than a day of effort feature-request A feature should be added or improved. p2 package/tools Related to AWS CDK Tools or CLI
Projects
None yet
2 participants