-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: notice for https://github.com/aws/aws-cdk/issues/25674 #210
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -207,6 +207,46 @@ | |
} | ||
], | ||
"schemaVersion": "1" | ||
}, | ||
{ | ||
"title": "(eks) eks overly permissive trust policies", | ||
"issueNumber": 25674, | ||
"overview": "The default MastersRole allows any identity in the account with the appropriate sts:AssumeRole permissions to assume it.", | ||
"components": [ | ||
{ | ||
"name": "@aws-cdk/aws-eks.Cluster", | ||
"version": ">=1.57.0 <1.62.0" | ||
}, | ||
{ | ||
"name": "@aws-cdk/aws-eks.FargateCluster", | ||
"version": ">=1.57.0 <1.62.0" | ||
} | ||
], | ||
"schemaVersion": "1" | ||
}, | ||
{ | ||
"title": "(eks) eks overly permissive trust policies", | ||
"issueNumber": 25674, | ||
"overview": "Cluster CreationRole and default MastersRole allows any identity in the account with the appropriate sts:AssumeRole permissions to assume it.", | ||
"components": [ | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. These suffer from both the default masters role and the creation role |
||
{ | ||
"name": "@aws-cdk/aws-eks.Cluster", | ||
"version": ">=1.62.0 <1.202.0" | ||
}, | ||
{ | ||
"name": "@aws-cdk/aws-eks.FargateCluster", | ||
"version": ">=1.62.0 <1.202.0" | ||
}, | ||
{ | ||
"name": "aws-cdk-lib.aws_eks.Cluster", | ||
"version": ">=2.0.0-rc.1 <2.80.0" | ||
}, | ||
{ | ||
"name": "aws-cdk-lib.aws_eks.FargateCluster", | ||
"version": ">=2.0.0-rc.1 <2.80.0" | ||
} | ||
], | ||
"schemaVersion": "1" | ||
} | ||
] | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -40,7 +40,8 @@ describe('Notices file is valid', () => { | |
test('v2 version ranges must be bounded at the bottom', () => { | ||
for (const component of notice.components) { | ||
if (component.version === '1.*') { continue; } // Special range that we allow | ||
if (semver.intersects(component.version, '2') && !semver.subset(component.version, '2')) { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Using There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think what we're trying to convey here is that:
Maybe it would be simpler to do the following:
Potentially a simpler set of tests? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Potentially, I honestly don't have the mental capacity right now to rework this... |
||
if (semver.intersects(component.version, '2', { includePrerelease: true }) | ||
&& !semver.subset(component.version, '2', { includePrerelease: true })) { | ||
throw new Error(`${component.version} should have an upper bound in v1 range, or a lower bound in v2 range (version should look like "^2.3.4 <2.5.6")`); | ||
} | ||
} | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These only suffer from the default masters role.