Skip to content

Commit 5244c64

Browse files
authored
Merge pull request #176 from aws-solutions/release/v2.0.2
Patch release v2.0.2
2 parents 996817b + 50343aa commit 5244c64

20 files changed

+2625
-2005
lines changed

CHANGELOG.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,15 @@ All notable changes to this project will be documented in this file.
55
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
66
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
77

8+
## [2.0.2] - 2023-10-24
9+
10+
### Security
11+
12+
- Upgraded @babel/traverse to mitigate CVE-2023-45133
13+
- Upgraded urllib3 to mitigate CVE-2023-45803
14+
- Upgraded aws-cdk-lib to mitigate CVE-2023-35165
15+
- Upgraded @cdklabs/cdk-ssm-documents to mitigate CVE-2023-26115
16+
817
## [2.0.1] - 2023-04-20
918

1019
### Fixed

CODE_OF_CONDUCT.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
## Code of Conduct
22
This project has adopted the [Amazon Open Source Code of Conduct](https://aws.github.io/code-of-conduct).
33
For more information see the [Code of Conduct FAQ](https://aws.github.io/code-of-conduct-faq) or contact
4-
opensource-codeofconduct@amazon.com with any additional questions or comments.
4+
opensource-codeofconduct@amazon.com with any additional questions or comments.

NOTICE.txt

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
Automated Security Response on AWS
2+
23
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
34
Licensed under the Apache License Version 2.0 (the "License"). You may not use this file except
45
in compliance with the License. A copy of the License is located at http://www.apache.org/licenses/
@@ -45,9 +46,31 @@ pytest under the MIT License
4546
pytest-cov under the MIT License
4647
pytest-env under the MIT License
4748
pytest-mock under the MIT License
48-
python-dateutil under the Apache License 2.0 and the BSD 3-Clause "New" or "Revised" License
49+
python-dateutil under the Apache License 2.0 and the BSD 3-Clause
4950
s3transfer under the Apache License 2.0
5051
setuptools under the MIT License
5152
six under the MIT License
5253
urllib3 under the MIT License
5354
virtualenv under the MIT License
55+
Jinja2 under the BSD 3-Clause
56+
MarkupSafe under the BSD 3-Clause
57+
Werkzeug under the BSD 3-Clause
58+
boolean.py under the BSD-2-Clause
59+
botocore-stubs under the MIT License
60+
cffi under the MIT License
61+
coverage under the Apache License 2.0
62+
cryptography under the Apache License 2.0 and the BSD 3-Clause
63+
exceptiongroup under the MIT License
64+
iniconfig under the MIT License
65+
license-expression under the Apache License 2.0
66+
mypy-boto3-s3 under the MIT License
67+
pluggy under the MIT License
68+
py-partiql-parser under the MIT License
69+
pycparser under the BSD 3-Clause
70+
responses under the Apache License 2.0
71+
tomli under the MIT License
72+
types-PyYAML under the Apache License 2.0
73+
types-awscrt under the MIT License
74+
types-s3transfer under the MIT License
75+
typing_extensions under the Python Software Foundation License
76+
xmltodict under the MIT License

deployment/testing_requirements.txt

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,4 @@ pytest
55
pytest-cov
66
pytest-env
77
pytest-mock
8-
## boto3 and botocore should match Lambda runtime: https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtimes.html
9-
boto3==1.20.32
10-
botocore==1.23.32
11-
## jmespath, python-dateutil, s3transfer, six, and urllib3 should match Lambda runtime
12-
jmespath==0.10.0
13-
python-dateutil==2.8.2
14-
s3transfer==0.5.2
15-
six==1.16.0
16-
urllib3==1.26.11
8+
urllib3<2

source/lib/__snapshots__/member-stack.test.ts.snap

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -980,6 +980,16 @@ exports[`member stack snapshot matches 1`] = `
980980
"DependsOn": [
981981
"WaitProviderRole83B0295F",
982982
],
983+
"Metadata": {
984+
"cdk_nag": {
985+
"rules_to_suppress": [
986+
{
987+
"id": "AwsSolutions-L1",
988+
"reason": "Will upgrade in next release to prioritize patch",
989+
},
990+
],
991+
},
992+
},
983993
"Properties": {
984994
"Code": {
985995
"S3Bucket": {

source/lib/member/redshift-audit-logging.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ export class RedshiftAuditLogging extends Construct {
3030
expression: Fn.conditionEquals(templateParam.valueAsString, ChoiceParam.Yes),
3131
});
3232

33-
const bucket = new Bucket(scope, 'S3BucketForRedShiftAuditLogging', {
33+
const bucket = new Bucket(scope, 'S3BucketForRedShiftAuditLogging', { //NOSONAR The policy attached to this bucket enforces SSL.
3434
encryption: BucketEncryption.S3_MANAGED,
3535
publicReadAccess: false,
3636
blockPublicAccess: BlockPublicAccess.BLOCK_ALL,

source/lib/solution_deploy-stack.ts

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -276,6 +276,13 @@ export class SolutionDeployStack extends cdk.Stack {
276276
};
277277
}
278278

279+
cdk_nag.NagSuppressions.addResourceSuppressions(checkSSMDocState, [
280+
{
281+
id: "AwsSolutions-L1",
282+
reason: "Will upgrade in next release to prioritize patch",
283+
},
284+
]);
285+
279286
/**
280287
* @description getApprovalRequirement - determine whether manual approval is required
281288
* @type {lambda.Function}
@@ -325,6 +332,13 @@ export class SolutionDeployStack extends cdk.Stack {
325332
};
326333
}
327334

335+
cdk_nag.NagSuppressions.addResourceSuppressions(getApprovalRequirement, [
336+
{
337+
id: "AwsSolutions-L1",
338+
reason: "Will upgrade in next release to prioritize patch",
339+
},
340+
]);
341+
328342
/**
329343
* @description execAutomation - initiate an SSM automation document in a target account
330344
* @type {lambda.Function}
@@ -373,6 +387,13 @@ export class SolutionDeployStack extends cdk.Stack {
373387
};
374388
}
375389

390+
cdk_nag.NagSuppressions.addResourceSuppressions(execAutomation, [
391+
{
392+
id: "AwsSolutions-L1",
393+
reason: "Will upgrade in next release to prioritize patch",
394+
},
395+
]);
396+
376397
/**
377398
* @description monitorSSMExecState - get the status of an ssm execution
378399
* @type {lambda.Function}
@@ -421,6 +442,13 @@ export class SolutionDeployStack extends cdk.Stack {
421442
};
422443
}
423444

445+
cdk_nag.NagSuppressions.addResourceSuppressions(monitorSSMExecState, [
446+
{
447+
id: "AwsSolutions-L1",
448+
reason: "Will upgrade in next release to prioritize patch",
449+
},
450+
]);
451+
424452
/**
425453
* @description Policy for role used by common Orchestrator notification lambda
426454
* @type {Policy}
@@ -555,6 +583,13 @@ export class SolutionDeployStack extends cdk.Stack {
555583
};
556584
}
557585

586+
cdk_nag.NagSuppressions.addResourceSuppressions(sendNotifications, [
587+
{
588+
id: "AwsSolutions-L1",
589+
reason: "Will upgrade in next release to prioritize patch",
590+
},
591+
]);
592+
558593
//-------------------------------------------------------------------------
559594
// Custom Lambda Policy
560595
//
@@ -669,6 +704,13 @@ export class SolutionDeployStack extends cdk.Stack {
669704
},
670705
};
671706

707+
cdk_nag.NagSuppressions.addResourceSuppressions(createCustomAction, [
708+
{
709+
id: "AwsSolutions-L1",
710+
reason: "Will upgrade in next release to prioritize patch",
711+
},
712+
]);
713+
672714
const orchestrator = new OrchestratorConstruct(this, 'orchestrator', {
673715
roleArn: orchestratorRole.roleArn,
674716
ssmDocStateLambda: checkSSMDocState.functionArn,

source/lib/wait-provider.ts

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ export class WaitProvider extends Construct {
7575
},
7676
]);
7777

78-
const lambdaFunction = new Function(scope, `${id}Function`, {
78+
const lambdaFunction = new Function(scope, `${id}Function`, { //NOSONAR This is not unknown code.
7979
role,
8080
runtime: props.runtimePython,
8181
code: Code.fromBucket(
@@ -87,6 +87,13 @@ export class WaitProvider extends Construct {
8787
timeout: Duration.minutes(15),
8888
});
8989

90+
NagSuppressions.addResourceSuppressions(lambdaFunction, [
91+
{
92+
id: "AwsSolutions-L1",
93+
reason: "Will upgrade in next release to prioritize patch",
94+
},
95+
]);
96+
9097
return new WaitProvider(scope, id, { serviceToken: lambdaFunction.functionArn });
9198
}
9299
}

0 commit comments

Comments
 (0)