ecr-scan-verifier 0.0.2 → 0.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.jsii CHANGED
@@ -3961,7 +3961,7 @@
3961
3961
  },
3962
3962
  "name": "ecr-scan-verifier",
3963
3963
  "readme": {
3964
- "markdown": "# ecr-scan-verifier\n\nAn AWS CDK Construct that **blocks deployments** to ECS, Lambda, and other services when **ECR Image Scanning detects vulnerabilities**.\n\nIt integrates both Basic and Enhanced (Amazon Inspector) scanning into your CDK deployment pipeline.\n\n- **Block any construct's deployment** — block ECS, Lambda, or any CDK construct on vulnerability detection via `blockConstructs`\n- **Notify without failing** — get alerts via SNS without blocking deployment. Great for gradual adoption\n- **Scan logs output** — results go to S3 or CloudWatch Logs\n- **SBOM generation** — output Software Bill of Materials in CycloneDX or SPDX format to S3 via Amazon Inspector\n\n## Scanning Modes\n\nThis construct supports two scanning modes. With Basic scanning, the construct starts a scan via API during deployment, or checks existing scan-on-push results. Enhanced scanning (Amazon Inspector) only supports scan-on-push, but additionally enables SBOM generation.\n\n| Feature | Basic Scanning | Enhanced Scanning |\n|---|---|---|\n| Start scan via API | ✅ (`startScan: true`) | — |\n| Check scan-on-push results | ✅ (`startScan: false`) | ✅ |\n| SBOM generation | — | ✅ |\n\n### Prerequisites\n\nWhen using `ScanConfig.basic({ startScan: true })` (the default), the construct starts a scan via the ECR `StartImageScan` API during deployment — no additional ECR configuration is required.\n\nFor all other modes, **scan-on-push must be enabled** on your ECR repository or account before deployment:\n\n- **`ScanConfig.basic({ startScan: false })`** — requires Basic scan-on-push to be enabled on the repository\n- **`ScanConfig.enhanced()`** — requires Enhanced scanning (Amazon Inspector) to be enabled on the account, with the repository included in Inspector's coverage\n\nIf scan-on-push is not configured and no prior scan results exist, the deployment will fail with an error.\n\n> **Tip**: `startScan: true` works even when scan-on-push is already enabled. If a scan has already been triggered, the construct simply uses the existing scan results.\n\n## Usage\n\n### Install\n\n```sh\nnpm install ecr-scan-verifier\n```\n\n### CDK Code\n\nThe following code is a minimal example that scans the image and blocks the ECS deployment if vulnerabilities are detected.\n\n```ts\nimport { EcrScanVerifier, ScanConfig } from 'ecr-scan-verifier';\n\n// Target image to scan\nconst image = new DockerImageAsset(this, 'DockerImage', {\n directory: resolve(__dirname, './'),\n});\n\n// Example of an ECS construct that uses the image\nconst ecs = new YourECSConstruct(this, 'YourECSConstruct', {\n dockerImage: image,\n});\n\n// Scan the image before deploying to ECS\nnew EcrScanVerifier(this, 'ImageScanner', {\n repository: image.repository,\n imageTag: image.assetHash,\n scanConfig: ScanConfig.basic(),\n // If vulnerabilities are detected, the ECS deployment will be blocked\n blockConstructs: [ecs],\n});\n```\n\n### Image Tag\n\nYou can specify which image to scan by tag or digest:\n\n```ts\n// Scan by tag (default: 'latest')\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n imageTag: 'v1.0',\n});\n\n// Scan by digest (if the value starts with 'sha256:', it is treated as a digest)\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n imageTag: 'sha256:abc123...',\n});\n```\n\n### Scan Configuration\n\nUse `ScanConfig` to choose between Basic and Enhanced scanning:\n\n```ts\nimport { ScanConfig } from 'ecr-scan-verifier';\n\n// Basic scanning (default) — starts a scan via StartImageScan API\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic({ startScan: true }),\n});\n\n// Basic scanning — polls for existing scan results (useful when scan-on-push is configured)\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic({ startScan: false }),\n});\n\n// Enhanced scanning — uses Amazon Inspector (scan-on-push only)\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.enhanced(),\n});\n```\n\nSee [Prerequisites](#prerequisites) for the scan-on-push requirements of each mode.\n\n> **Important**: If Enhanced scanning (Amazon Inspector) is enabled on your account, you must use `ScanConfig.enhanced()`. Using `ScanConfig.basic()` with an Enhanced scanning account will result in a deployment error.\n\n### Severity\n\nYou can specify which severity levels trigger a failure:\n\n```ts\nimport { Severity } from 'ecr-scan-verifier';\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n severity: [Severity.CRITICAL, Severity.HIGH],\n});\n```\n\nAvailable severity levels: `CRITICAL`, `HIGH`, `MEDIUM`, `LOW`, `INFORMATIONAL`, `UNDEFINED`.\n\n### Ignore Findings\n\nYou can ignore specific CVEs:\n\n```ts\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n ignoreFindings: ['CVE-2023-37920', 'CVE-2024-12345'],\n});\n```\n\n### Scan Logs Output\n\nYou can choose where to output the scan logs using `ScanLogsOutput`: S3 or CloudWatch Logs. If not specified, scan logs are written to the Scanner Lambda function's default log group.\n\n#### S3\n\n```ts\nconst scanLogsBucket = new Bucket(this, 'ScanLogsBucket');\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n scanLogsOutput: ScanLogsOutput.s3({\n bucket: scanLogsBucket,\n prefix: 'scan-logs/', // Optional\n }),\n});\n```\n\n#### CloudWatch Logs\n\n```ts\nimport { ScanLogsOutput } from 'ecr-scan-verifier';\n\nconst scanLogsLogGroup = new LogGroup(this, 'ScanLogsLogGroup');\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n scanLogsOutput: ScanLogsOutput.cloudWatchLogs({ logGroup: scanLogsLogGroup }),\n});\n```\n\n#### Default Log Group\n\nYou can customize the Scanner Lambda function's log group with `defaultLogGroup`.\n\nIf you use `EcrScanVerifier` construct multiple times in the same stack, you have to set the same log group for `defaultLogGroup` for each construct. When you set different log groups for each construct, a warning message will be displayed.\n\n```ts\nconst logGroup = new LogGroup(this, 'LogGroup');\n\nnew EcrScanVerifier(this, 'Scanner1', {\n repository,\n scanConfig: ScanConfig.basic(),\n defaultLogGroup: logGroup,\n});\n\nnew EcrScanVerifier(this, 'Scanner2', {\n repository,\n scanConfig: ScanConfig.basic(),\n defaultLogGroup: new LogGroup(this, 'AnotherLogGroup'), // NG: different log group from Scanner1\n defaultLogGroup: logGroup, // OK: Use the same log group as Scanner1 to avoid warning\n});\n```\n\n### SBOM Output\n\nYou can generate SBOM (Software Bill of Materials) using Amazon Inspector's CreateSbomExport API. This is independent from scan logs output.\n\n**Note**: SBOM export is only available with Enhanced scanning. Using with Basic scanning will throw an error.\n\n```ts\nimport { SbomOutput, ScanConfig } from 'ecr-scan-verifier';\n\nconst sbomBucket = new Bucket(this, 'SbomBucket');\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.enhanced(),\n sbomOutput: SbomOutput.cycloneDx14({\n bucket: sbomBucket,\n prefix: 'sbom/', // Optional\n kmsKeyArn: 'arn:aws:kms:...', // Optional: KMS key for encryption\n }),\n});\n```\n\nAvailable SBOM formats:\n\n- `SbomOutput.cycloneDx14()` — CycloneDX 1.4 JSON format\n- `SbomOutput.spdx23()` — SPDX 2.3 JSON format\n\n### SNS Notification for Vulnerabilities\n\nYou can configure an SNS topic via `vulnsNotificationTopic` to receive notifications when vulnerabilities are detected.\n\nBy default, the construct fails the deployment when vulnerabilities are found.\nYou can set `failOnVulnerability: false` to receive SNS notifications without blocking the deployment.\n\n```ts\nconst notificationTopic = new Topic(this, 'VulnerabilityNotificationTopic');\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n vulnsNotificationTopic: notificationTopic,\n failOnVulnerability: false, // Notify but don't fail deployment\n});\n```\n"
3964
+ "markdown": "# ecr-scan-verifier\n\nAn AWS CDK Construct that **blocks deployments** to ECS, Lambda, and other services when **ECR Image Scanning detects vulnerabilities**.\n\nIt scans a specified container image during CDK deployment using Basic or Enhanced (Amazon Inspector) scanning.\n\n- **Block any construct's deployment** — block ECS, Lambda, or any CDK construct on vulnerability detection via `blockConstructs`\n- **Notify without failing** — get alerts via SNS without blocking deployment. Great for gradual adoption\n- **Scan logs output** — results go to S3 or CloudWatch Logs\n- **SBOM generation** — output Software Bill of Materials in CycloneDX or SPDX format to S3 via Amazon Inspector\n\n## Scanning Modes\n\nThis construct supports two scanning modes. With Basic scanning, the construct starts a scan via API during deployment, or checks existing scan-on-push results. Enhanced scanning (Amazon Inspector) only supports scan-on-push, but additionally enables SBOM generation.\n\n| Feature | Basic Scanning | Enhanced Scanning |\n|---|---|---|\n| Start scan via API | ✅ (`startScan: true`) | — |\n| Check scan-on-push results | ✅ (`startScan: false`) | ✅ |\n| SBOM generation | — | ✅ |\n\n### Prerequisites\n\nWhen using `ScanConfig.basic({ startScan: true })` (the default), the construct starts a scan via the ECR `StartImageScan` API during deployment — no additional ECR configuration is required.\n\nFor all other modes, **scan-on-push must be enabled** on your ECR repository or account before deployment:\n\n- **`ScanConfig.basic({ startScan: false })`** — requires Basic scan-on-push to be enabled on the repository\n- **`ScanConfig.enhanced()`** — requires Enhanced scanning (Amazon Inspector) to be enabled on the account, with the repository included in Inspector's coverage\n\nIf scan-on-push is not configured and no prior scan results exist, the deployment will fail with an error.\n\n> **Tip**: `startScan: true` works even when scan-on-push is already enabled. If a scan has already been triggered, the construct simply uses the existing scan results.\n\n## Usage\n\n### Install\n\n```sh\nnpm install ecr-scan-verifier\n```\n\n### CDK Code\n\nThe following code is a minimal example that scans the image and blocks the ECS deployment if vulnerabilities are detected.\n\n```ts\nimport { EcrScanVerifier, ScanConfig } from 'ecr-scan-verifier';\n\n// Target image to scan\nconst image = new DockerImageAsset(this, 'DockerImage', {\n directory: resolve(__dirname, './'),\n});\n\n// Example of an ECS construct that uses the image\nconst ecs = new YourECSConstruct(this, 'YourECSConstruct', {\n dockerImage: image,\n});\n\n// Scan the image before deploying to ECS\nnew EcrScanVerifier(this, 'ImageScanner', {\n repository: image.repository,\n imageTag: image.assetHash,\n scanConfig: ScanConfig.basic(),\n // If vulnerabilities are detected, the ECS deployment will be blocked\n blockConstructs: [ecs],\n});\n```\n\n### Image Tag\n\nYou can specify which image to scan by tag or digest:\n\n```ts\n// Scan by tag (default: 'latest')\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n imageTag: 'v1.0',\n});\n\n// Scan by digest (if the value starts with 'sha256:', it is treated as a digest)\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n imageTag: 'sha256:abc123...',\n});\n```\n\n### Scan Configuration\n\nUse `ScanConfig` to choose between Basic and Enhanced scanning:\n\n```ts\nimport { ScanConfig } from 'ecr-scan-verifier';\n\n// Basic scanning (default) — starts a scan via StartImageScan API\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic({ startScan: true }),\n});\n\n// Basic scanning — polls for existing scan results (useful when scan-on-push is configured)\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic({ startScan: false }),\n});\n\n// Enhanced scanning — uses Amazon Inspector (scan-on-push only)\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.enhanced(),\n});\n```\n\nSee [Prerequisites](#prerequisites) for the scan-on-push requirements of each mode.\n\n> **Important**: If Enhanced scanning (Amazon Inspector) is enabled on your account, you must use `ScanConfig.enhanced()`. Using `ScanConfig.basic()` with an Enhanced scanning account will result in a deployment error.\n\n### Severity\n\nYou can specify which severity levels trigger a failure:\n\n```ts\nimport { Severity } from 'ecr-scan-verifier';\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n severity: [Severity.CRITICAL, Severity.HIGH],\n});\n```\n\nAvailable severity levels: `CRITICAL`, `HIGH`, `MEDIUM`, `LOW`, `INFORMATIONAL`, `UNDEFINED`.\n\n### Ignore Findings\n\nYou can ignore specific CVEs:\n\n```ts\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n ignoreFindings: ['CVE-2023-37920', 'CVE-2024-12345'],\n});\n```\n\n### Scan Logs Output\n\nYou can choose where to output the scan logs using `ScanLogsOutput`: S3 or CloudWatch Logs. If not specified, scan logs are written to the Scanner Lambda function's default log group.\n\n#### S3\n\n```ts\nimport { ScanLogsOutput } from 'ecr-scan-verifier';\n\nconst scanLogsBucket = new Bucket(this, 'ScanLogsBucket');\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n scanLogsOutput: ScanLogsOutput.s3({\n bucket: scanLogsBucket,\n prefix: 'scan-logs/', // Optional\n }),\n});\n```\n\n#### CloudWatch Logs\n\n```ts\nimport { ScanLogsOutput } from 'ecr-scan-verifier';\n\nconst scanLogsLogGroup = new LogGroup(this, 'ScanLogsLogGroup');\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n scanLogsOutput: ScanLogsOutput.cloudWatchLogs({ logGroup: scanLogsLogGroup }),\n});\n```\n\n#### Default Log Group\n\nYou can customize the Scanner Lambda function's log group with `defaultLogGroup`.\n\nIf you use `EcrScanVerifier` construct multiple times in the same stack, you have to set the same log group for `defaultLogGroup` for each construct. When you set different log groups for each construct, a warning message will be displayed.\n\n```ts\nconst logGroup = new LogGroup(this, 'LogGroup');\n\nnew EcrScanVerifier(this, 'Scanner1', {\n repository,\n scanConfig: ScanConfig.basic(),\n defaultLogGroup: logGroup,\n});\n\nnew EcrScanVerifier(this, 'Scanner2', {\n repository,\n scanConfig: ScanConfig.basic(),\n defaultLogGroup: new LogGroup(this, 'AnotherLogGroup'), // NG: different log group from Scanner1\n defaultLogGroup: logGroup, // OK: Use the same log group as Scanner1 to avoid warning\n});\n```\n\n### SBOM Output\n\nYou can generate SBOM (Software Bill of Materials) using Amazon Inspector's CreateSbomExport API. This is independent from scan logs output.\n\n**Note**: SBOM export is only available with Enhanced scanning. Using with Basic scanning will throw an error.\n\n```ts\nimport { SbomOutput, ScanConfig } from 'ecr-scan-verifier';\n\nconst sbomBucket = new Bucket(this, 'SbomBucket');\nconst sbomEncryptionKey = new Key(this, 'SbomEncryptionKey');\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.enhanced(),\n sbomOutput: SbomOutput.cycloneDx14({\n bucket: sbomBucket,\n prefix: 'sbom/', // Optional\n encryptionKey: sbomEncryptionKey,\n }),\n});\n```\n\nAvailable SBOM formats:\n\n- `SbomOutput.cycloneDx14()` — CycloneDX 1.4 JSON format\n- `SbomOutput.spdx23()` — SPDX 2.3 JSON format\n\n### SNS Notification for Vulnerabilities\n\nYou can configure an SNS topic via `vulnsNotificationTopic` to receive notifications when vulnerabilities are detected.\n\nBy default, the construct fails the deployment when vulnerabilities are found.\nYou can set `failOnVulnerability: false` to receive SNS notifications without blocking the deployment.\n\n```ts\nconst notificationTopic = new Topic(this, 'VulnerabilityNotificationTopic');\n\nnew EcrScanVerifier(this, 'Scanner', {\n repository,\n scanConfig: ScanConfig.basic(),\n vulnsNotificationTopic: notificationTopic,\n failOnVulnerability: false, // Notify but don't fail deployment\n});\n```\n"
3965
3965
  },
3966
3966
  "repository": {
3967
3967
  "type": "git",
@@ -5149,6 +5149,6 @@
5149
5149
  "symbolId": "src/types:Severity"
5150
5150
  }
5151
5151
  },
5152
- "version": "0.0.2",
5153
- "fingerprint": "AKN1vQyBsPqbE817727RWsDYMjwOWEzqNBoTQoAdBKI="
5152
+ "version": "0.0.4",
5153
+ "fingerprint": "oJTYMO2fEGG0WnJvgUKvol6vIWaZrAJ5BsxbP9cptoY="
5154
5154
  }
package/README.md CHANGED
@@ -2,7 +2,7 @@
2
2
 
3
3
  An AWS CDK Construct that **blocks deployments** to ECS, Lambda, and other services when **ECR Image Scanning detects vulnerabilities**.
4
4
 
5
- It integrates both Basic and Enhanced (Amazon Inspector) scanning into your CDK deployment pipeline.
5
+ It scans a specified container image during CDK deployment using Basic or Enhanced (Amazon Inspector) scanning.
6
6
 
7
7
  - **Block any construct's deployment** — block ECS, Lambda, or any CDK construct on vulnerability detection via `blockConstructs`
8
8
  - **Notify without failing** — get alerts via SNS without blocking deployment. Great for gradual adoption
@@ -152,6 +152,8 @@ You can choose where to output the scan logs using `ScanLogsOutput`: S3 or Cloud
152
152
  #### S3
153
153
 
154
154
  ```ts
155
+ import { ScanLogsOutput } from 'ecr-scan-verifier';
156
+
155
157
  const scanLogsBucket = new Bucket(this, 'ScanLogsBucket');
156
158
 
157
159
  new EcrScanVerifier(this, 'Scanner', {
@@ -211,6 +213,7 @@ You can generate SBOM (Software Bill of Materials) using Amazon Inspector's Crea
211
213
  import { SbomOutput, ScanConfig } from 'ecr-scan-verifier';
212
214
 
213
215
  const sbomBucket = new Bucket(this, 'SbomBucket');
216
+ const sbomEncryptionKey = new Key(this, 'SbomEncryptionKey');
214
217
 
215
218
  new EcrScanVerifier(this, 'Scanner', {
216
219
  repository,
@@ -218,7 +221,7 @@ new EcrScanVerifier(this, 'Scanner', {
218
221
  sbomOutput: SbomOutput.cycloneDx14({
219
222
  bucket: sbomBucket,
220
223
  prefix: 'sbom/', // Optional
221
- kmsKeyArn: 'arn:aws:kms:...', // Optional: KMS key for encryption
224
+ encryptionKey: sbomEncryptionKey,
222
225
  }),
223
226
  });
224
227
  ```
@@ -1,7 +1,7 @@
1
- "use strict";var O=Object.defineProperty;var H=Object.getOwnPropertyDescriptor;var j=Object.getOwnPropertyNames;var X=Object.prototype.hasOwnProperty;var z=(t,o)=>{for(var n in o)O(t,n,{get:o[n],enumerable:!0})},q=(t,o,n,e)=>{if(o&&typeof o=="object"||typeof o=="function")for(let s of j(o))!X.call(t,s)&&s!==n&&O(t,s,{get:()=>o[s],enumerable:!(e=H(o,s))||e.enumerable});return t};var J=t=>q(O({},"__esModule",{value:!0}),t);var cn={};z(cn,{handler:()=>V});module.exports=J(cn);var w=require("@aws-sdk/client-ecr"),x=new w.ECRClient,L=t=>new Promise(o=>setTimeout(o,t)),k=t=>t.startsWith("sha256:")?{imageDigest:t}:{imageTag:t},R=async(t,o,n,e,s)=>{let i=k(o);console.log(`Starting image scan for ${t}...`);try{await x.send(new w.StartImageScanCommand({repositoryName:t,imageId:i})),console.log("Image scan started successfully.")}catch(a){if(a.name==="LimitExceededException"||a.message&&a.message.includes("scan frequency limit"))console.log("Scan already in progress or recently completed, polling for results...");else throw a.name==="ValidationException"&&a.message&&a.message.includes("This feature is disabled")?new Error("StartImageScan is disabled because Enhanced scanning (Amazon Inspector) is enabled on this account. Use ScanConfig.enhanced() instead of ScanConfig.basic()."):a}return $(t,o,n,e,s)},$=async(t,o,n,e,s)=>{let i=k(o);for(let a=0;a<s;a++){console.log(`Polling scan results (attempt ${a+1}/${s})...`);try{let c=await Y(t,i),r=c.rawResponse.imageScanStatus?.status;if(r==="COMPLETE"||r==="ACTIVE")return console.log(`Scan completed with status: ${r}`),c;if(r==="FAILED"){let u=c.rawResponse.imageScanStatus?.description||"Unknown error";throw new Error(`ECR image scan failed: ${u}`)}if(r==="UNSUPPORTED_IMAGE")throw new Error("ECR image scan failed: Image is not supported for scanning.");console.log(`Scan status: ${r}, waiting ${e}s...`)}catch(c){if(c.name==="ScanNotFoundException"){if(a<s-1){console.log(`Scan not found yet (attempt ${a+1}/${s}), waiting ${e}s before retrying...`),await L(e*1e3);continue}throw new Error(`No scan results found for the image after ${s*e} seconds. Ensure that image scanning is enabled for this repository. If using Enhanced scanning (Amazon Inspector), verify that the repository is included in Inspector's coverage.`)}throw c}await L(e*1e3)}throw new Error(`ECR image scan timed out after ${s*e} seconds. The scan may still be in progress. Check the ECR console for results.`)},Y=async(t,o)=>{let n=[],e=[],s,i;do{let r=await x.send(new w.DescribeImageScanFindingsCommand({repositoryName:t,imageId:o,nextToken:s,maxResults:1e3}));i=r,r.imageScanFindings?.findings&&n.push(...r.imageScanFindings.findings),r.imageScanFindings?.enhancedFindings&&e.push(...r.imageScanFindings.enhancedFindings),s=r.nextToken}while(s);let a=i?.imageScanFindings?.findingSeverityCounts?Object.fromEntries(Object.entries(i.imageScanFindings.findingSeverityCounts).map(([r,u])=>[r,u??0])):{};return{scanType:e.length>0?"ENHANCED":"BASIC",status:i?.imageScanStatus?.status??"UNKNOWN",basicFindings:n,enhancedFindings:e,severityCounts:a,rawResponse:i}};var F=(t,o,n)=>{let e=new Set(n),s=new Set(o);return t.scanType==="ENHANCED"?Z(t,s,e):Q(t,s,e)},Q=(t,o,n)=>{let e=t.basicFindings.filter(c=>!n.has(c.name||"")),s={},i=!1;for(let c of e){let r=c.severity||"UNDEFINED";s[r]=(s[r]||0)+1,o.has(r)&&(i=!0)}let a=T(s);return{hasVulnerabilities:i,summary:a,filteredSeverityCounts:s}},Z=(t,o,n)=>{let e=t.enhancedFindings.filter(c=>{if(n.has(c.findingArn||""))return!1;let r=c.packageVulnerabilityDetails?.vulnerabilityId;return!(r&&n.has(r))}),s={},i=!1;for(let c of e){let r=c.severity||"UNDEFINED";s[r]=(s[r]||0)+1,o.has(r)&&(i=!0)}let a=T(s);return{hasVulnerabilities:i,summary:a,filteredSeverityCounts:s}},T=t=>["CRITICAL","HIGH","MEDIUM","LOW","INFORMATIONAL","UNDEFINED"].filter(n=>t[n]).map(n=>`${n}: ${t[n]}`).join(", "),P=(t,o,n,e)=>{let s=["=== ECR Image Scan Results ===",`Repository: ${n}`,`Image: ${e}`,`Scan Type: ${t.scanType}`,`Scan Status: ${t.status}`,"","--- Severity Summary ---"];return o.summary?s.push(o.summary):s.push("No vulnerabilities found."),s.join(`
1
+ "use strict";var O=Object.defineProperty;var H=Object.getOwnPropertyDescriptor;var j=Object.getOwnPropertyNames;var X=Object.prototype.hasOwnProperty;var z=(t,o)=>{for(var n in o)O(t,n,{get:o[n],enumerable:!0})},q=(t,o,n,e)=>{if(o&&typeof o=="object"||typeof o=="function")for(let s of j(o))!X.call(t,s)&&s!==n&&O(t,s,{get:()=>o[s],enumerable:!(e=H(o,s))||e.enumerable});return t};var J=t=>q(O({},"__esModule",{value:!0}),t);var cn={};z(cn,{handler:()=>U});module.exports=J(cn);var w=require("@aws-sdk/client-ecr"),x=new w.ECRClient,I=t=>new Promise(o=>setTimeout(o,t)),k=t=>t.startsWith("sha256:")?{imageDigest:t}:{imageTag:t},F=async(t,o,n,e,s)=>{let i=k(o);console.log(`Starting image scan for ${t}...`);try{await x.send(new w.StartImageScanCommand({repositoryName:t,imageId:i})),console.log("Image scan started successfully.")}catch(a){if(a.name==="LimitExceededException"||a.message&&a.message.includes("scan frequency limit"))console.log("Scan already in progress or recently completed, polling for results...");else throw a.name==="ValidationException"&&a.message&&a.message.includes("This feature is disabled")?new Error("StartImageScan is disabled because Enhanced scanning (Amazon Inspector) is enabled on this account. Use ScanConfig.enhanced() instead of ScanConfig.basic()."):a}return $(t,o,n,e,s)},$=async(t,o,n,e,s)=>{let i=k(o);for(let a=0;a<s;a++){console.log(`Polling scan results (attempt ${a+1}/${s})...`);try{let c=await Y(t,i),r=c.rawResponse.imageScanStatus?.status;if(r==="COMPLETE"||r==="ACTIVE")return console.log(`Scan completed with status: ${r}`),c;if(r==="FAILED"){let u=c.rawResponse.imageScanStatus?.description||"Unknown error";throw new Error(`ECR image scan failed: ${u}`)}if(r==="UNSUPPORTED_IMAGE")throw new Error("ECR image scan failed: Image is not supported for scanning.");console.log(`Scan status: ${r}, waiting ${e}s...`)}catch(c){if(c.name==="ScanNotFoundException"){if(a<s-1){console.log(`Scan not found yet (attempt ${a+1}/${s}), waiting ${e}s before retrying...`),await I(e*1e3);continue}throw new Error(`No scan results found for the image after ${s*e} seconds. Ensure that image scanning is enabled for this repository. If using Enhanced scanning (Amazon Inspector), verify that the repository is included in Inspector's coverage.`)}throw c}await I(e*1e3)}throw new Error(`ECR image scan timed out after ${s*e} seconds. The scan may still be in progress. Check the ECR console for results.`)},Y=async(t,o)=>{let n=[],e=[],s,i;do{let r=await x.send(new w.DescribeImageScanFindingsCommand({repositoryName:t,imageId:o,nextToken:s,maxResults:1e3}));i=r,r.imageScanFindings?.findings&&n.push(...r.imageScanFindings.findings),r.imageScanFindings?.enhancedFindings&&e.push(...r.imageScanFindings.enhancedFindings),s=r.nextToken}while(s);let a=i?.imageScanFindings?.findingSeverityCounts?Object.fromEntries(Object.entries(i.imageScanFindings.findingSeverityCounts).map(([r,u])=>[r,u??0])):{};return{scanType:e.length>0?"ENHANCED":"BASIC",status:i?.imageScanStatus?.status??"UNKNOWN",basicFindings:n,enhancedFindings:e,severityCounts:a,rawResponse:i}};var R=(t,o,n)=>{let e=new Set(n),s=new Set(o);return t.scanType==="ENHANCED"?Z(t,s,e):Q(t,s,e)},Q=(t,o,n)=>{let e=t.basicFindings.filter(c=>!n.has(c.name||"")),s={},i=!1;for(let c of e){let r=c.severity||"UNDEFINED";s[r]=(s[r]||0)+1,o.has(r)&&(i=!0)}let a=T(s);return{hasVulnerabilities:i,summary:a,filteredSeverityCounts:s}},Z=(t,o,n)=>{let e=t.enhancedFindings.filter(c=>{if(n.has(c.findingArn||""))return!1;let r=c.packageVulnerabilityDetails?.vulnerabilityId;return!(r&&n.has(r))}),s={},i=!1;for(let c of e){let r=c.severity||"UNDEFINED";s[r]=(s[r]||0)+1,o.has(r)&&(i=!0)}let a=T(s);return{hasVulnerabilities:i,summary:a,filteredSeverityCounts:s}},T=t=>["CRITICAL","HIGH","MEDIUM","LOW","INFORMATIONAL","UNDEFINED"].filter(n=>t[n]).map(n=>`${n}: ${t[n]}`).join(", "),P=(t,o,n,e)=>{let s=["=== ECR Image Scan Results ===",`Repository: ${n}`,`Image: ${e}`,`Scan Type: ${t.scanType}`,`Scan Status: ${t.status}`,"","--- Severity Summary ---"];return o.summary?s.push(o.summary):s.push("No vulnerabilities found."),s.join(`
2
2
  `)};var S=require("@aws-sdk/client-cloudwatch-logs"),G=new S.CloudWatchLogsClient,B=async(t,o,n,e)=>{let s=e.replace(/:/g,",").replace(/\//g,"_"),i=`${s}/findings`,a=`${s}/summary`,c=new Date().getTime();return await v(n.logGroupName,i,c,t),await v(n.logGroupName,a,c,o),console.log(`Scan logs output to the log group: ${n.logGroupName}
3
3
  findings stream: ${i}
4
- summary stream: ${a}`),{type:"cloudwatch",logGroupName:n.logGroupName,findingsLogStreamName:i,summaryLogStreamName:a}},A=1048576,nn=t=>{let n=new TextEncoder().encode(t);if(n.length<=A)return[t];let e=[],s=0,a=A-20;for(;s<n.length;){let c=n.slice(s,s+a),r=new TextDecoder("utf-8",{fatal:!1});e.push(r.decode(c)),s+=a}return e},v=async(t,o,n,e)=>{try{await G.send(new S.CreateLogStreamCommand({logGroupName:t,logStreamName:o}))}catch(u){if(u instanceof S.ResourceAlreadyExistsException)console.log(`Log stream ${o} already exists in log group ${t}.`);else throw u}let s=nn(e),i=s.length;i>1&&console.log(`Message size exceeds 1 MB limit. Splitting into ${i} chunks.`);let a=s.map((u,m)=>({timestamp:n+m,message:i>1?`[part ${m+1}/${i}] ${u}`:u})),c={logGroupName:t,logStreamName:o,logEvents:a},r=new S.PutLogEventsCommand(c);await G.send(r)};var C=require("@aws-sdk/client-s3");var I=new C.S3Client,D=async(t,o,n,e,s)=>{let i=new Date().toISOString(),a=e.replace(/:/g,"/").replace(/\//g,"_"),r=`${n.prefix?n.prefix.endsWith("/")?n.prefix:`${n.prefix}/`:""}${a}/${i}`,u=`${r}/findings.json`,m=`${r}/summary.txt`,d=[I.send(new C.PutObjectCommand({Bucket:n.bucketName,Key:u,Body:t,ContentType:"application/json"})),I.send(new C.PutObjectCommand({Bucket:n.bucketName,Key:m,Body:o,ContentType:"text/plain"}))],g;if(s){let f=s.format==="SPDX_2_3"?"spdx.json":"cyclonedx.json";g=`${r}/sbom.${f}`,d.push(I.send(new C.PutObjectCommand({Bucket:n.bucketName,Key:g,Body:s.content,ContentType:"application/json"})))}return await Promise.all(d),console.log(g?`Scan logs and SBOM output to S3:
4
+ summary stream: ${a}`),{type:"cloudwatch",logGroupName:n.logGroupName,findingsLogStreamName:i,summaryLogStreamName:a}},A=1048576,nn=t=>{let n=new TextEncoder().encode(t);if(n.length<=A)return[t];let e=[],s=0,a=A-20;for(;s<n.length;){let c=n.slice(s,s+a),r=new TextDecoder("utf-8",{fatal:!1});e.push(r.decode(c)),s+=a}return e},v=async(t,o,n,e)=>{try{await G.send(new S.CreateLogStreamCommand({logGroupName:t,logStreamName:o}))}catch(u){if(u instanceof S.ResourceAlreadyExistsException)console.log(`Log stream ${o} already exists in log group ${t}.`);else throw u}let s=nn(e),i=s.length;i>1&&console.log(`Message size exceeds 1 MB limit. Splitting into ${i} chunks.`);let a=s.map((u,m)=>({timestamp:n+m,message:i>1?`[part ${m+1}/${i}] ${u}`:u})),c={logGroupName:t,logStreamName:o,logEvents:a},r=new S.PutLogEventsCommand(c);await G.send(r)};var C=require("@aws-sdk/client-s3");var N=new C.S3Client,D=async(t,o,n,e,s)=>{let i=new Date().toISOString(),a=e.replace(/:/g,"/").replace(/\//g,"_"),r=`${n.prefix?n.prefix.endsWith("/")?n.prefix:`${n.prefix}/`:""}${a}/${i}`,u=`${r}/findings.json`,m=`${r}/summary.txt`,d=[N.send(new C.PutObjectCommand({Bucket:n.bucketName,Key:u,Body:t,ContentType:"application/json"})),N.send(new C.PutObjectCommand({Bucket:n.bucketName,Key:m,Body:o,ContentType:"text/plain"}))],g;if(s){let f=s.format==="SPDX_2_3"?"spdx.json":"cyclonedx.json";g=`${r}/sbom.${f}`,d.push(N.send(new C.PutObjectCommand({Bucket:n.bucketName,Key:g,Body:s.content,ContentType:"application/json"})))}return await Promise.all(d),console.log(g?`Scan logs and SBOM output to S3:
5
5
  findings: s3://${n.bucketName}/${u}
6
6
  summary: s3://${n.bucketName}/${m}
7
7
  SBOM: s3://${n.bucketName}/${g}`:`Scan logs output to S3:
@@ -40,18 +40,18 @@ aws logs tail ${e.logGroupName} --since 1h
40
40
  \`\`\``);let a=`${s}
41
41
 
42
42
  How to view logs:
43
- ${i}`,c={version:"1.0",source:"custom",content:{title:"Image Scanner with ECR - Vulnerability Alert",description:`## Scanned Image
43
+ ${i}`,c={version:"1.0",source:"custom",content:{title:"Ecr Scan Verifier - Vulnerability Alert",description:`## Scanned Image
44
44
  ${n}
45
45
 
46
46
  ## Scan Logs
47
47
  ${a}
48
48
 
49
49
  ## Details
50
- ${o}`}},r=`Image Scanner with ECR detected vulnerabilities in ${n}
50
+ ${o}`}},r=`Ecr Scan Verifier detected vulnerabilities in ${n}
51
51
 
52
52
  ${a}
53
53
 
54
- ${o}`,u={default:r,email:r,https:JSON.stringify(c)};try{await en.send(new E.PublishCommand({TopicArn:t,Message:JSON.stringify(u),MessageStructure:"json"})),console.log(`Vulnerability notification sent to SNS topic: ${t}`)}catch(m){console.error(`Failed to send vulnerability notification to SNS: ${m}`)}};var y=require("@aws-sdk/client-cloudformation"),tn=new y.CloudFormationClient,M=async t=>{let o=new y.DescribeStacksCommand({StackName:t}),n=await tn.send(o);if(n.Stacks&&n.Stacks.length>0){let e=n.Stacks[0].StackStatus;return e===y.ResourceStatus.ROLLBACK_IN_PROGRESS||e===y.ResourceStatus.UPDATE_ROLLBACK_IN_PROGRESS}throw new Error(`Stack not found or no stacks returned from DescribeStacks command, stackId: ${t}`)};var l=require("@aws-sdk/client-inspector2"),h=require("@aws-sdk/client-s3"),W=new l.Inspector2Client,K=new h.S3Client,sn=t=>new Promise(o=>setTimeout(o,t)),U=async(t,o,n,e,s)=>{let i=n==="SPDX_2_3"?l.SbomReportFormat.SPDX_2_3:l.SbomReportFormat.CYCLONEDX_1_4;console.log(`Starting SBOM export for ${t} with format ${n}...`);let a={ecrRepositoryName:[{comparison:"EQUALS",value:t}],...o?{ecrImageTags:[{comparison:"EQUALS",value:o}]}:{}},r=(await W.send(new l.CreateSbomExportCommand({reportFormat:i,s3Destination:{bucketName:e,keyPrefix:`sbom-exports/${t}`,kmsKeyArn:s},resourceFilterCriteria:a}))).reportId;if(!r)throw new Error("CreateSbomExport did not return a reportId.");console.log(`SBOM export started with reportId: ${r}`);let u=60,m=5;for(let d=0;d<u;d++){let g=await W.send(new l.GetSbomExportCommand({reportId:r})),f=g.status;if(console.log(`SBOM export status: ${f} (attempt ${d+1}/${u})`),f==="SUCCEEDED"){let p=g.s3Destination?.keyPrefix,b=g.s3Destination?.bucketName;if(!b||!p)throw new Error("SBOM export succeeded but S3 destination is missing.");let N=await on(b,p);if(!N)throw new Error(`SBOM export succeeded but no file found in S3 under prefix: ${p}`);return{sbomContent:await rn(b,N),format:n}}if(f==="FAILED"){let p=g.filterCriteria;throw new Error(`SBOM export failed. Filter criteria: ${JSON.stringify(p)}`)}if(f==="CANCELLED")throw new Error("SBOM export was cancelled.");await sn(m*1e3)}throw new Error(`SBOM export timed out after ${u*m} seconds.`)},on=async(t,o)=>(await K.send(new h.ListObjectsV2Command({Bucket:t,Prefix:o,MaxKeys:1}))).Contents?.[0]?.Key,rn=async(t,o)=>await(await K.send(new h.GetObjectCommand({Bucket:t,Key:o}))).Body?.transformToString()??"";var V=async function(t){let o=t.RequestType,n=t.ResourceProperties;if(!n.addr||!n.repositoryName)throw new Error("addr and repositoryName are required.");let e={PhysicalResourceId:n.addr,Data:{}};if(o!=="Create"&&o!=="Update")return e;let s=5,i=60,a=`${n.repositoryName}:${n.imageTag}`,c;n.startScan==="true"?c=await R(n.repositoryName,n.imageTag,n.scanType,s,i):c=await $(n.repositoryName,n.imageTag,n.scanType,s,i);let r=F(c,n.severity,n.ignoreFindings),u;if(n.sbom)if(n.scanType==="ENHANCED"){let b=await U(n.repositoryName,n.imageTag,n.sbom.format,n.sbom.bucketName,n.sbom.kmsKeyArn);u={content:b.sbomContent,format:b.format}}else console.log("SBOM export is only available with Enhanced scanning. Skipping SBOM generation.");let m=c.enhancedFindings.length>0?c.enhancedFindings:c.basicFindings,d=JSON.stringify(m,null,2),g=P(c,r,n.repositoryName,n.imageTag),f=await an(d,g,a,n.output,n.defaultLogGroupName,u);if(!r.hasVulnerabilities)return e;let p=`ECR Image Scan found vulnerabilities.
54
+ ${o}`,u={default:r,email:r,https:JSON.stringify(c)};try{await en.send(new E.PublishCommand({TopicArn:t,Message:JSON.stringify(u),MessageStructure:"json"})),console.log(`Vulnerability notification sent to SNS topic: ${t}`)}catch(m){console.error(`Failed to send vulnerability notification to SNS: ${m}`)}};var y=require("@aws-sdk/client-cloudformation"),tn=new y.CloudFormationClient,M=async t=>{let o=new y.DescribeStacksCommand({StackName:t}),n=await tn.send(o);if(n.Stacks&&n.Stacks.length>0){let e=n.Stacks[0].StackStatus;return e===y.ResourceStatus.ROLLBACK_IN_PROGRESS||e===y.ResourceStatus.UPDATE_ROLLBACK_IN_PROGRESS}throw new Error(`Stack not found or no stacks returned from DescribeStacks command, stackId: ${t}`)};var l=require("@aws-sdk/client-inspector2"),h=require("@aws-sdk/client-s3"),W=new l.Inspector2Client,K=new h.S3Client,sn=t=>new Promise(o=>setTimeout(o,t)),V=async(t,o,n,e,s)=>{let i=n==="SPDX_2_3"?l.SbomReportFormat.SPDX_2_3:l.SbomReportFormat.CYCLONEDX_1_4;console.log(`Starting SBOM export for ${t} with format ${n}...`);let a={ecrRepositoryName:[{comparison:"EQUALS",value:t}],...o?{ecrImageTags:[{comparison:"EQUALS",value:o}]}:{}},r=(await W.send(new l.CreateSbomExportCommand({reportFormat:i,s3Destination:{bucketName:e,keyPrefix:`sbom-exports/${t}`,kmsKeyArn:s},resourceFilterCriteria:a}))).reportId;if(!r)throw new Error("CreateSbomExport did not return a reportId.");console.log(`SBOM export started with reportId: ${r}`);let u=60,m=5;for(let d=0;d<u;d++){let g=await W.send(new l.GetSbomExportCommand({reportId:r})),f=g.status;if(console.log(`SBOM export status: ${f} (attempt ${d+1}/${u})`),f==="SUCCEEDED"){let p=g.s3Destination?.keyPrefix,b=g.s3Destination?.bucketName;if(!b||!p)throw new Error("SBOM export succeeded but S3 destination is missing.");let L=await on(b,p);if(!L)throw new Error(`SBOM export succeeded but no file found in S3 under prefix: ${p}`);return{sbomContent:await rn(b,L),format:n}}if(f==="FAILED"){let p=g.filterCriteria;throw new Error(`SBOM export failed. Filter criteria: ${JSON.stringify(p)}`)}if(f==="CANCELLED")throw new Error("SBOM export was cancelled.");await sn(m*1e3)}throw new Error(`SBOM export timed out after ${u*m} seconds.`)},on=async(t,o)=>(await K.send(new h.ListObjectsV2Command({Bucket:t,Prefix:o,MaxKeys:1}))).Contents?.[0]?.Key,rn=async(t,o)=>await(await K.send(new h.GetObjectCommand({Bucket:t,Key:o}))).Body?.transformToString()??"";var U=async function(t){let o=t.RequestType,n=t.ResourceProperties;if(!n.addr||!n.repositoryName)throw new Error("addr and repositoryName are required.");let e={PhysicalResourceId:n.addr,Data:{}};if(o!=="Create"&&o!=="Update")return e;let s=5,i=60,a=`${n.repositoryName}:${n.imageTag}`,c;n.startScan==="true"?c=await F(n.repositoryName,n.imageTag,n.scanType,s,i):c=await $(n.repositoryName,n.imageTag,n.scanType,s,i);let r=R(c,n.severity,n.ignoreFindings),u;if(n.sbom)if(n.scanType==="ENHANCED"){let b=await V(n.repositoryName,n.imageTag,n.sbom.format,n.sbom.bucketName,n.sbom.kmsKeyArn);u={content:b.sbomContent,format:b.format}}else console.log("SBOM export is only available with Enhanced scanning. Skipping SBOM generation.");let m=c.enhancedFindings.length>0?c.enhancedFindings:c.basicFindings,d=JSON.stringify(m,null,2),g=P(c,r,n.repositoryName,n.imageTag),f=await an(d,g,a,n.output,n.defaultLogGroupName,u);if(!r.hasVulnerabilities)return e;let p=`ECR Image Scan found vulnerabilities.
55
55
  Image: ${a}
56
56
  Scan Type: ${c.scanType}
57
57
  Findings: ${r.summary}
@@ -122,5 +122,5 @@ class EcrScanVerifier extends constructs_1.Construct {
122
122
  }
123
123
  exports.EcrScanVerifier = EcrScanVerifier;
124
124
  _a = JSII_RTTI_SYMBOL_1;
125
- EcrScanVerifier[_a] = { fqn: "ecr-scan-verifier.EcrScanVerifier", version: "0.0.2" };
125
+ EcrScanVerifier[_a] = { fqn: "ecr-scan-verifier.EcrScanVerifier", version: "0.0.4" };
126
126
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ecr-scan-verifier.js","sourceRoot":"","sources":["../src/ecr-scan-verifier.ts"],"names":[],"mappings":";;;;;AAAA,+BAA4B;AAC5B,6CAAoF;AAEpF,iDAAsD;AACtD,uDAAwF;AAGxF,mEAAwD;AACxD,2CAAmD;AAKnD,mCAAmC;AA+GnC;;;;GAIG;AACH,MAAa,eAAgB,SAAQ,sBAAS;IAG5C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA2B;QACnE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,IAAI,CAAC,eAAe,GAAG,KAAK,CAAC,eAAe,CAAC;QAC7C,MAAM,aAAa,GAAG,6CAA6C,CAAC;QAEpE,MAAM,oBAAoB,GAAG,IAAI,8BAAiB,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC/E,IAAI,EAAE,sCAAsC;YAC5C,aAAa;YACb,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,OAAO,EAAE,eAAe;YACxB,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAA,WAAI,EAAC,SAAS,EAAE,uBAAuB,CAAC,EAAE;gBAC7D,uBAAuB;gBACvB,+FAA+F;gBAC/F,wFAAwF;gBACxF,OAAO,EAAE,CAAC,cAAc,CAAC;aAC1B,CAAC;YACF,YAAY,EAAE,yBAAY,CAAC,MAAM;YACjC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,GAAG,CAAC;YAC9B,aAAa,EAAE,CAAC;YAChB,QAAQ,EAAE,IAAI,CAAC,eAAe;SAC/B,CAAC,CAAC;QAEH,MAAM,QAAQ,GAAG,KAAK,CAAC,QAAQ,IAAI,QAAQ,CAAC;QAE5C,MAAM,gBAAgB,GAAG,KAAK,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC;QACjD,mDAAmD;QACnD,IAAI,KAAK,CAAC,UAAU,IAAI,gBAAgB,CAAC,QAAQ,KAAK,OAAO,EAAE,CAAC;YAC9D,MAAM,IAAI,KAAK,CACb,gIAAgI,CACjI,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,KAAK,CAAC,cAAc,EAAE,IAAI,CAAC,oBAAoB,CAAC,CAAC;QAEvE,2CAA2C;QAC3C,MAAM,UAAU,GAAG,KAAK,CAAC,UAAU,EAAE,IAAI,CAAC,oBAAoB,CAAC,CAAC;QAEhE,uBAAuB;QACvB,oBAAoB,CAAC,eAAe,CAClC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,+BAA+B,EAAE,oBAAoB,CAAC;YAChE,SAAS,EAAE,CAAC,KAAK,CAAC,UAAU,CAAC,aAAa,CAAC;SAC5C,CAAC,CACH,CAAC;QAEF,IAAI,gBAAgB,CAAC,QAAQ,KAAK,UAAU,EAAE,CAAC;YAC7C,oBAAoB,CAAC,eAAe,CAClC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,yBAAyB,EAAE,yBAAyB,CAAC;gBAC/D,SAAS,EAAE,CAAC,GAAG,CAAC;aACjB,CAAC,CACH,CAAC;QACJ,CAAC;QAED,IAAI,gBAAgB,CAAC,SAAS,EAAE,CAAC;YAC/B,oBAAoB,CAAC,eAAe,CAClC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,oBAAoB,CAAC;gBAC/B,SAAS,EAAE,CAAC,KAAK,CAAC,UAAU,CAAC,aAAa,CAAC;aAC5C,CAAC,CACH,CAAC;QACJ,CAAC;QAED,uDAAuD;QACvD,IAAI,UAAU,EAAE,CAAC;YACf,oBAAoB,CAAC,eAAe,CAClC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,6BAA6B,EAAE,0BAA0B,CAAC;gBACpE,SAAS,EAAE,CAAC,GAAG,CAAC;aACjB,CAAC,CACH,CAAC;QACJ,CAAC;QAED,IAAI,KAAK,CAAC,sBAAsB,EAAE,CAAC;YACjC,KAAK,CAAC,sBAAsB,CAAC,YAAY,CAAC,oBAAoB,CAAC,CAAC;QAClE,CAAC;QAED,MAAM,uBAAuB,GAAG,KAAK,CAAC,uBAAuB,IAAI,IAAI,CAAC;QACtE,IAAI,uBAAuB,EAAE,CAAC;YAC5B,oBAAoB,CAAC,eAAe,CAClC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,+BAA+B,CAAC;gBAC1C,SAAS,EAAE,CAAC,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC;aACpC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,oFAAoF;QACpF,qBAAO,CAAC,EAAE,CAAC,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,GAAG,CAAC;YAC7B,KAAK,EAAE,CAAC,IAAI,EAAE,EAAE;gBACd,IACE,IAAI,YAAY,eAAe;oBAC/B,IAAI,CAAC,gBAAgB,EAAE,IAAI,CAAC,IAAI,KAAK,IAAI,CAAC,eAAe,EAAE,IAAI,CAAC,IAAI,EACpE,CAAC;oBACD,yBAAW,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,YAAY,CAC/B,mDAAmD,EACnD,gHAAgH,CACjH,CAAC;gBACJ,CAAC;YACH,CAAC;SACF,CAAC,CAAC;QAEH,MAAM,gBAAgB,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,UAAU,EAAE;YACtD,cAAc,EAAE,oBAAoB;SACrC,CAAC,CAAC;QAEH,MAAM,kBAAkB,GAA+B;YACrD,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,IAAI;YACpB,cAAc,EAAE,KAAK,CAAC,UAAU,CAAC,cAAc;YAC/C,QAAQ;YACR,QAAQ,EAAE,gBAAgB,CAAC,QAAQ;YACnC,SAAS,EAAE,MAAM,CAAC,gBAAgB,CAAC,SAAS,CAAC;YAC7C,QAAQ,EAAE,KAAK,CAAC,QAAQ,IAAI,CAAC,gBAAQ,CAAC,QAAQ,CAAC;YAC/C,mBAAmB,EAAE,MAAM,CAAC,KAAK,CAAC,mBAAmB,IAAI,IAAI,CAAC;YAC9D,cAAc,EAAE,KAAK,CAAC,cAAc,IAAI,EAAE;YAC1C,MAAM,EAAE,aAAa;YACrB,IAAI,EAAE,UAAU;YAChB,uBAAuB,EAAE,MAAM,CAAC,uBAAuB,CAAC;YACxD,aAAa,EAAE,KAAK,CAAC,sBAAsB,EAAE,QAAQ;YACrD,mBAAmB,EACjB,IAAI,CAAC,eAAe,EAAE,YAAY,IAAI,eAAe,oBAAoB,CAAC,YAAY,EAAE;SAC3F,CAAC;QAEF,IAAI,4BAAc,CAAC,IAAI,EAAE,UAAU,EAAE;YACnC,YAAY,EAAE,yBAAyB;YACvC,UAAU,EAAE,kBAAkB;YAC9B,YAAY,EAAE,gBAAgB,CAAC,YAAY;SAC5C,CAAC,CAAC;QAEH,KAAK,CAAC,eAAe,EAAE,OAAO,CAAC,CAAC,SAAS,EAAE,EAAE;YAC3C,SAAS,CAAC,IAAI,CAAC,aAAa,CAAC,IAAI,CAAC,CAAC;QACrC,CAAC,CAAC,CAAC;IACL,CAAC;IAED,gBAAgB;IAChB,IAAI,gBAAgB;QAClB,OAAO,IAAI,CAAC,eAAe,CAAC;IAC9B,CAAC;;AA7IH,0CA8IC","sourcesContent":["import { join } from 'path';\nimport { Annotations, Aspects, CustomResource, Duration, Stack } from 'aws-cdk-lib';\nimport { IRepository } from 'aws-cdk-lib/aws-ecr';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Architecture, Code, Runtime, SingletonFunction } from 'aws-cdk-lib/aws-lambda';\nimport { ILogGroup } from 'aws-cdk-lib/aws-logs';\nimport { ITopic } from 'aws-cdk-lib/aws-sns';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct, IConstruct } from 'constructs';\nimport { ScannerCustomResourceProps } from './custom-resource-props';\nimport { SbomOutput } from './sbom-output';\nimport { ScanConfig } from './scan-config';\nimport { ScanLogsOutput } from './scan-logs-output';\nimport { Severity } from './types';\n\n/**\n * Properties for EcrScanVerifier Construct.\n */\nexport interface EcrScanVerifierProps {\n  /**\n   * ECR Repository to scan.\n   */\n  readonly repository: IRepository;\n\n  /**\n   * Image tag or digest to scan.\n   *\n   * You can specify a tag (e.g., 'v1.0', 'latest') or a digest (e.g., 'sha256:abc123...').\n   * If the value starts with 'sha256:', it is treated as a digest.\n   *\n   * @default 'latest'\n   */\n  readonly imageTag?: string;\n\n  /**\n   * Scan configuration: basic (ECR native) or enhanced (Amazon Inspector).\n   *\n   * Use `ScanConfig.basic()` for ECR native basic scanning,\n   * or `ScanConfig.enhanced()` for Amazon Inspector enhanced scanning.\n   */\n  readonly scanConfig: ScanConfig;\n\n  /**\n   * Severity threshold for vulnerability detection.\n   *\n   * If vulnerabilities at or above any of the specified severity levels are found,\n   * the scan will be considered as having found vulnerabilities.\n   *\n   * @default [Severity.CRITICAL]\n   */\n  readonly severity?: Severity[];\n\n  /**\n   * Whether to fail the CloudFormation deployment if vulnerabilities are detected\n   * above the severity threshold.\n   *\n   * @default true\n   */\n  readonly failOnVulnerability?: boolean;\n\n  /**\n   * Finding IDs to ignore during vulnerability evaluation.\n   *\n   * For basic scanning: CVE IDs (e.g., 'CVE-2023-37920')\n   * For enhanced scanning: finding ARNs or CVE IDs\n   *\n   * @default - no findings ignored\n   */\n  readonly ignoreFindings?: string[];\n\n  /**\n   * Configuration for scan logs output.\n   *\n   * @default - scan logs output to default log group created by Scanner Lambda.\n   */\n  readonly scanLogsOutput?: ScanLogsOutput;\n\n  /**\n   * SBOM (Software Bill of Materials) output configuration.\n   *\n   * SBOM export uses Amazon Inspector's CreateSbomExport API to generate SBOM\n   * and uploads it to S3.\n   *\n   * **Note**: SBOM export is only available with Enhanced scanning (Amazon Inspector).\n   * Using with Basic scanning will throw an error.\n   *\n   * @default - no SBOM output\n   */\n  readonly sbomOutput?: SbomOutput;\n\n  /**\n   * The Scanner Lambda function's default log group.\n   *\n   * If you use EcrScanVerifier construct multiple times in the same stack,\n   * you must specify the same log group for each construct.\n   *\n   * @default - Scanner Lambda creates the default log group.\n   */\n  readonly defaultLogGroup?: ILogGroup;\n\n  /**\n   * Suppress errors during rollback scanner Lambda execution.\n   *\n   * @default true\n   */\n  readonly suppressErrorOnRollback?: boolean;\n\n  /**\n   * SNS topic for vulnerability notification.\n   *\n   * Supports AWS Chatbot message format.\n   *\n   * @default - no notification\n   */\n  readonly vulnsNotificationTopic?: ITopic;\n\n  /**\n   * Constructs to block if vulnerabilities are detected.\n   *\n   * @default - no constructs to block\n   */\n  readonly blockConstructs?: IConstruct[];\n}\n\n/**\n * A Construct that verifies container image scan findings with ECR image scanning.\n * It uses a Lambda function as a Custom Resource provider to call ECR scan APIs\n * and evaluate scan findings.\n */\nexport class EcrScanVerifier extends Construct {\n  private readonly defaultLogGroup?: ILogGroup;\n\n  constructor(scope: Construct, id: string, props: EcrScanVerifierProps) {\n    super(scope, id);\n\n    this.defaultLogGroup = props.defaultLogGroup;\n    const lambdaPurpose = 'Custom::EcrScanVerifierCustomResourceLambda';\n\n    const customResourceLambda = new SingletonFunction(this, 'CustomResourceLambda', {\n      uuid: 'c56cee6b-6775-541b-d179-c1535d88a0c8',\n      lambdaPurpose,\n      runtime: Runtime.NODEJS_22_X,\n      handler: 'index.handler',\n      code: Code.fromAsset(join(__dirname, '../assets/lambda/dist'), {\n        // exclude node_modules\n        // because the native binary of the installed esbuild changes depending on the cpu architecture\n        // and the hash value of the image asset changes depending on the execution environment.\n        exclude: ['node_modules'],\n      }),\n      architecture: Architecture.ARM_64,\n      timeout: Duration.seconds(900),\n      retryAttempts: 0,\n      logGroup: this.defaultLogGroup,\n    });\n\n    const imageTag = props.imageTag ?? 'latest';\n\n    const scanConfigOutput = props.scanConfig.bind();\n    // Validate: SBOM output requires Enhanced scanning\n    if (props.sbomOutput && scanConfigOutput.scanType === 'BASIC') {\n      throw new Error(\n        'SBOM output is only available with Enhanced scanning (ScanConfig.enhanced()). Basic scanning does not support SBOM generation.',\n      );\n    }\n\n    const outputOptions = props.scanLogsOutput?.bind(customResourceLambda);\n\n    // SBOM output (independent from scan logs)\n    const sbomConfig = props.sbomOutput?.bind(customResourceLambda);\n\n    // ECR scan permissions\n    customResourceLambda.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['ecr:DescribeImageScanFindings', 'ecr:DescribeImages'],\n        resources: [props.repository.repositoryArn],\n      }),\n    );\n\n    if (scanConfigOutput.scanType === 'ENHANCED') {\n      customResourceLambda.addToRolePolicy(\n        new PolicyStatement({\n          actions: ['inspector2:ListCoverage', 'inspector2:ListFindings'],\n          resources: ['*'],\n        }),\n      );\n    }\n\n    if (scanConfigOutput.startScan) {\n      customResourceLambda.addToRolePolicy(\n        new PolicyStatement({\n          actions: ['ecr:StartImageScan'],\n          resources: [props.repository.repositoryArn],\n        }),\n      );\n    }\n\n    // SBOM export permissions (Inspector CreateSbomExport)\n    if (sbomConfig) {\n      customResourceLambda.addToRolePolicy(\n        new PolicyStatement({\n          actions: ['inspector2:CreateSbomExport', 'inspector2:GetSbomExport'],\n          resources: ['*'],\n        }),\n      );\n    }\n\n    if (props.vulnsNotificationTopic) {\n      props.vulnsNotificationTopic.grantPublish(customResourceLambda);\n    }\n\n    const suppressErrorOnRollback = props.suppressErrorOnRollback ?? true;\n    if (suppressErrorOnRollback) {\n      customResourceLambda.addToRolePolicy(\n        new PolicyStatement({\n          actions: ['cloudformation:DescribeStacks'],\n          resources: [Stack.of(this).stackId],\n        }),\n      );\n    }\n\n    // Check for defaultLogGroup consistency across multiple instances in the same stack\n    Aspects.of(Stack.of(this)).add({\n      visit: (node) => {\n        if (\n          node instanceof EcrScanVerifier &&\n          node._defaultLogGroup?.node.path !== this.defaultLogGroup?.node.path\n        ) {\n          Annotations.of(this).addWarningV2(\n            '@ecr-scan-verifier:duplicateLambdaDefaultLogGroup',\n            \"You have to set the same log group for 'defaultLogGroup' for each EcrScanVerifier construct in the same stack.\",\n          );\n        }\n      },\n    });\n\n    const verifierProvider = new Provider(this, 'Provider', {\n      onEventHandler: customResourceLambda,\n    });\n\n    const verifierProperties: ScannerCustomResourceProps = {\n      addr: this.node.addr,\n      repositoryName: props.repository.repositoryName,\n      imageTag,\n      scanType: scanConfigOutput.scanType,\n      startScan: String(scanConfigOutput.startScan),\n      severity: props.severity ?? [Severity.CRITICAL],\n      failOnVulnerability: String(props.failOnVulnerability ?? true),\n      ignoreFindings: props.ignoreFindings ?? [],\n      output: outputOptions,\n      sbom: sbomConfig,\n      suppressErrorOnRollback: String(suppressErrorOnRollback),\n      vulnsTopicArn: props.vulnsNotificationTopic?.topicArn,\n      defaultLogGroupName:\n        this.defaultLogGroup?.logGroupName ?? `/aws/lambda/${customResourceLambda.functionName}`,\n    };\n\n    new CustomResource(this, 'Resource', {\n      resourceType: 'Custom::EcrScanVerifier',\n      properties: verifierProperties,\n      serviceToken: verifierProvider.serviceToken,\n    });\n\n    props.blockConstructs?.forEach((construct) => {\n      construct.node.addDependency(this);\n    });\n  }\n\n  /** @internal */\n  get _defaultLogGroup(): ILogGroup | undefined {\n    return this.defaultLogGroup;\n  }\n}\n"]}
@@ -30,7 +30,7 @@ class SbomOutput {
30
30
  }
31
31
  exports.SbomOutput = SbomOutput;
32
32
  _a = JSII_RTTI_SYMBOL_1;
33
- SbomOutput[_a] = { fqn: "ecr-scan-verifier.SbomOutput", version: "0.0.2" };
33
+ SbomOutput[_a] = { fqn: "ecr-scan-verifier.SbomOutput", version: "0.0.4" };
34
34
  class SbomOutputImpl extends SbomOutput {
35
35
  constructor(props, format) {
36
36
  super();
@@ -31,7 +31,7 @@ class ScanConfig {
31
31
  }
32
32
  exports.ScanConfig = ScanConfig;
33
33
  _a = JSII_RTTI_SYMBOL_1;
34
- ScanConfig[_a] = { fqn: "ecr-scan-verifier.ScanConfig", version: "0.0.2" };
34
+ ScanConfig[_a] = { fqn: "ecr-scan-verifier.ScanConfig", version: "0.0.4" };
35
35
  class BasicScanConfig extends ScanConfig {
36
36
  constructor(options) {
37
37
  super();
@@ -43,7 +43,7 @@ class ScanLogsOutput {
43
43
  }
44
44
  exports.ScanLogsOutput = ScanLogsOutput;
45
45
  _a = JSII_RTTI_SYMBOL_1;
46
- ScanLogsOutput[_a] = { fqn: "ecr-scan-verifier.ScanLogsOutput", version: "0.0.2" };
46
+ ScanLogsOutput[_a] = { fqn: "ecr-scan-verifier.ScanLogsOutput", version: "0.0.4" };
47
47
  class CloudWatchLogsOutput extends ScanLogsOutput {
48
48
  constructor(options) {
49
49
  super();
package/package.json CHANGED
@@ -60,7 +60,7 @@
60
60
  "publishConfig": {
61
61
  "access": "public"
62
62
  },
63
- "version": "0.0.2",
63
+ "version": "0.0.4",
64
64
  "types": "lib/index.d.ts",
65
65
  "stability": "stable",
66
66
  "jsii": {