Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Cloud Security] Vulnerabilities Preview & Refactor CSP Plugin PHASE 1 #193385

Merged
merged 6 commits into from
Sep 20, 2024

Conversation

animehart
Copy link
Contributor

@animehart animehart commented Sep 19, 2024

Summary

In an attempt to make Reviewing easier and more accurate, the implementation of Vulnerabilities on Host.name flyout in Alerts Page will be split into 2 Phases

Phase 1: Move Functions, Utils or Helpers, Hooks, constants to Package
Phase 2: Implementing the feature

@animehart
Copy link
Contributor Author

/ci

@animehart animehart marked this pull request as ready for review September 19, 2024 17:01
@animehart animehart requested review from a team as code owners September 19, 2024 17:01
@animehart animehart added v8.16.0 backport:prev-minor Backport to (8.x) the previous minor version (i.e. one version back from main) Team:Cloud Security Cloud Security team related labels Sep 19, 2024
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security)

@animehart animehart added the release_note:skip Skip the PR/issue when compiling release notes label Sep 19, 2024
Copy link
Contributor

@maxcold maxcold left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm, couple of small comments

@@ -7,7 +7,7 @@

// TODO: this needs to be defined in a versioned schema
import type { EcsEvent } from '@elastic/ecs';
import { VulnSeverity } from '../types_old';
import type { VulnSeverity } from '../..';
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it's better to import directly from ../../types/vulnerabilities than from index where it is re-exported

@@ -151,7 +151,7 @@ export interface CnvmDashboardData {
topVulnerabilities: VulnerabilityStat[];
}

export type VulnSeverity = 'LOW' | 'MEDIUM' | 'HIGH' | 'CRITICAL' | 'UNKNOWN';
// export type VulnSeverity = 'LOW' | 'MEDIUM' | 'HIGH' | 'CRITICAL' | 'UNKNOWN';
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

don't forget to remove

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

woops

@kibana-ci
Copy link
Collaborator

💛 Build succeeded, but was flaky

Failed CI Steps

Metrics [docs]

Module Count

Fewer modules leads to a faster build time

id before after diff
securitySolution 5813 5814 +1

Public APIs missing comments

Total count of every public API that lacks a comment. Target amount is 0. Run node scripts/build_api_docs --plugin [yourplugin] --stats comments for more detailed information.

id before after diff
@kbn/cloud-security-posture-common 60 66 +6

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
cloudSecurityPosture 496.7KB 496.7KB -33.0B
securitySolution 20.4MB 20.4MB +30.0B
total -3.0B

Page load bundle

Size of the bundles that are downloaded on every page load. Target size is below 100kb

id before after diff
cloudSecurityPosture 17.7KB 17.8KB +107.0B
Unknown metric groups

API count

id before after diff
@kbn/cloud-security-posture-common 61 68 +7

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@animehart animehart merged commit 434430a into elastic:main Sep 20, 2024
46 checks passed
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Sep 20, 2024
elastic#193385)

## Summary
In an attempt to make Reviewing easier and more accurate, the
implementation of Vulnerabilities on Host.name flyout in Alerts Page
will be split into 2 Phases

Phase 1: Move Functions, Utils or Helpers, Hooks, constants to Package
Phase 2: Implementing the feature

(cherry picked from commit 434430a)
@kibanamachine
Copy link
Contributor

💚 All backports created successfully

Status Branch Result
8.x

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation

kibanamachine added a commit that referenced this pull request Sep 20, 2024
…gin PHASE 1 (#193385) (#193640)

# Backport

This will backport the following commits from `main` to `8.x`:
- [[Cloud Security] Vulnerabilities Preview & Refactor CSP Plugin
PHASE 1 (#193385)](#193385)

<!--- Backport version: 9.4.3 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sqren/backport)

<!--BACKPORT [{"author":{"name":"Rickyanto
Ang","email":"[email protected]"},"sourceCommit":{"committedDate":"2024-09-20T20:54:44Z","message":"[Cloud
Security] Vulnerabilities Preview & Refactor CSP Plugin PHASE 1
(#193385)\n\n## Summary\r\nIn an attempt to make Reviewing easier and
more accurate, the\r\nimplementation of Vulnerabilities on Host.name
flyout in Alerts Page\r\nwill be split into 2 Phases\r\n\r\nPhase 1:
Move Functions, Utils or Helpers, Hooks, constants to Package\r\nPhase
2: Implementing the
feature","sha":"434430a995487971137ce6b3182d2285758cd4c1","branchLabelMapping":{"^v9.0.0$":"main","^v8.16.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","v9.0.0","Team:Cloud
Security","backport:prev-minor","v8.16.0"],"title":"[Cloud Security]
Vulnerabilities Preview & Refactor CSP Plugin PHASE
1","number":193385,"url":"https://github.com/elastic/kibana/pull/193385","mergeCommit":{"message":"[Cloud
Security] Vulnerabilities Preview & Refactor CSP Plugin PHASE 1
(#193385)\n\n## Summary\r\nIn an attempt to make Reviewing easier and
more accurate, the\r\nimplementation of Vulnerabilities on Host.name
flyout in Alerts Page\r\nwill be split into 2 Phases\r\n\r\nPhase 1:
Move Functions, Utils or Helpers, Hooks, constants to Package\r\nPhase
2: Implementing the
feature","sha":"434430a995487971137ce6b3182d2285758cd4c1"}},"sourceBranch":"main","suggestedTargetBranches":["8.x"],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/193385","number":193385,"mergeCommit":{"message":"[Cloud
Security] Vulnerabilities Preview & Refactor CSP Plugin PHASE 1
(#193385)\n\n## Summary\r\nIn an attempt to make Reviewing easier and
more accurate, the\r\nimplementation of Vulnerabilities on Host.name
flyout in Alerts Page\r\nwill be split into 2 Phases\r\n\r\nPhase 1:
Move Functions, Utils or Helpers, Hooks, constants to Package\r\nPhase
2: Implementing the
feature","sha":"434430a995487971137ce6b3182d2285758cd4c1"}},{"branch":"8.x","label":"v8.16.0","branchLabelMappingKey":"^v8.16.0$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: Rickyanto Ang <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:prev-minor Backport to (8.x) the previous minor version (i.e. one version back from main) release_note:skip Skip the PR/issue when compiling release notes Team:Cloud Security Cloud Security team related v8.16.0 v9.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants