Skip to content

Fix CI: E2E OIDC credential failure and npm audit vulnerabilities#3

Merged
jpr5 merged 2 commits into
mainfrom
fix/ci-e2e-and-audit-vulns
May 15, 2026
Merged

Fix CI: E2E OIDC credential failure and npm audit vulnerabilities#3
jpr5 merged 2 commits into
mainfrom
fix/ci-e2e-and-audit-vulns

Conversation

@jpr5
Copy link
Copy Markdown

@jpr5 jpr5 commented May 15, 2026

Summary

  • E2E Tests: Remove push: branches: [main] trigger from e2e-tests-full.yml. The E2E suite requires AWS OIDC credentials (E2E_AWS_ROLE_ARN secret, e2e-testing environment) that only exist on the upstream aws/agentcore-cli repo. On our fork, every merge to main triggered the workflow, which always failed with "Could not load credentials from any providers." The workflow retains workflow_dispatch (manual) and schedule (weekly) triggers.

  • npm audit: npm audit fix resolves all high-severity findings (protobufjs code injection/DoS/prototype pollution, fast-uri path traversal/host confusion, fast-xml-builder attribute bypass). Remaining moderate-severity findings are in AWS SDK transitive deps that require upstream major bumps. The security:audit CI check uses --audit-level=high so moderate findings pass.

Test plan

  • Quality and Safety Checks workflow passes (security:audit job exits 0)
  • E2E Tests (Full Suite) no longer triggers on push to main
  • Build and Test continues to pass

jpr5 added 2 commits May 15, 2026 12:21
The E2E tests require AWS OIDC credentials (E2E_AWS_ROLE_ARN secret
and e2e-testing environment) that only exist on the upstream
aws/agentcore-cli repo. On forks, the push-to-main trigger fires
on every merge but always fails with "Could not load credentials
from any providers" since the OIDC trust policy is scoped to the
upstream repo.

Remove the push trigger so E2E only runs via workflow_dispatch
(manual) and weekly schedule. GitHub Actions already suppresses
scheduled workflows on forks, so this effectively makes E2E
manual-only on forks while preserving full functionality upstream.
npm audit fix resolves 7 of 11 vulnerabilities:
- protobufjs: code injection, DoS, prototype pollution (high)
- fast-uri: path traversal, host confusion (high)
- fast-xml-builder: attribute bypass, comment regex bypass (high)
- uuid: buffer bounds check (moderate)
- @protobufjs/utf8: overlong UTF-8 decoding (moderate)
- ip-address: XSS in Address6 (moderate)

Remaining 4 moderate-severity findings (fast-xml-parser in
@aws-sdk/core, fast-uri bundled in aws-cdk-lib) cannot be
resolved without major version bumps from AWS SDK upstream.
The security:audit CI check uses --audit-level=high so these
moderate findings do not block.
@jpr5 jpr5 merged commit 719e51d into main May 15, 2026
10 of 12 checks passed
@github-actions github-actions Bot added the size/xs PR size: XS label May 15, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size/xs PR size: XS

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant