-
Notifications
You must be signed in to change notification settings - Fork 171
Labels
completedThis item is complete and has been merged/shippedThis item is complete and has been merged/shippedinternalPRs that introduce changes in governance, tech debt and chores (linting setup, baseline, etc.)PRs that introduce changes in governance, tech debt and chores (linting setup, baseline, etc.)
Description
Summary
Some of the changes introduced in #3438 lowered our OpenSSF Scorecard due to both pinned dependencies and actions using the latest
tag instead of a commit hash.
Specifically, the two are:
Which correspond to these two alerts:
- https://github.com/aws-powertools/powertools-lambda-typescript/security/code-scanning/77
- https://github.com/aws-powertools/powertools-lambda-typescript/security/code-scanning/76
Note that neither of them involves code that we ship to customers, this is only automation used for us to bootstrap new regions we use to deploy resources.
Why is this needed?
So we can restore our OpenSSF Scorecard score.
Which area does this relate to?
Other
Solution
The first should use a commit hash, similar to what we do here.
The second one should use the CDK version already present in the monorepo rather than install a different one.
Acknowledgment
- This request meets Powertools for AWS Lambda (TypeScript) Tenets
- Should this be considered in other Powertools for AWS Lambda languages? i.e. Python, Java, and .NET
Future readers
Please react with 👍 and your use case to help us understand customer demand.
Metadata
Metadata
Assignees
Labels
completedThis item is complete and has been merged/shippedThis item is complete and has been merged/shippedinternalPRs that introduce changes in governance, tech debt and chores (linting setup, baseline, etc.)PRs that introduce changes in governance, tech debt and chores (linting setup, baseline, etc.)
Type
Projects
Status
Shipped