diff --git a/doc/user/compliance/compliance_frameworks/_index.md b/doc/user/compliance/compliance_frameworks/_index.md index 99a8c81c0fb9f5e8aeada5f3aecdf11fce186b7a..3a76f51808bb3ae88db8c9eb71d5b0afffa2ca12 100644 --- a/doc/user/compliance/compliance_frameworks/_index.md +++ b/doc/user/compliance/compliance_frameworks/_index.md @@ -225,7 +225,6 @@ Combine GitLab compliance controls to help you meet | Error tracking enabled | `error_tracking_enabled` | Ensures that [error tracking](../../../operations/error_tracking.md) is enabled for the project. | | Force push disabled | `force_push_disabled` | Prevents [force pushing](../../project/repository/branches/protected.md) to repositories. | | Forks exist for the project | `has_forks` | Ensures that the project has been [forked](../../project/repository/forking_workflow.md) | -| Fuzz testing running | `scanner_fuzz_testing_running` | Ensures that [fuzz testing](../../application_security/coverage_fuzzing/_index.md) is configured and running in the project's default branch pipeline. Requires a successful pipeline run. | | GitLab license level Ultimate | `gitlab_license_level_ultimate` | Ensures that the GitLab instance is using an [Ultimate license](https://about.gitlab.com/pricing/feature-comparison/). | | Has valid CI/CD configuration | `has_valid_ci_config` | Ensures that the project has a [valid CI/CD configuration](../../../ci/yaml/_index.md). | | IaC scanning running | `scanner_iac_running` | Ensures [Infrastructure as Code (IaC) scanning](../../application_security/iac_scanning/_index.md) is configured and running in the project's default branch pipeline. Requires a successful pipeline run. | diff --git a/ee/app/assets/javascripts/compliance_dashboard/components/standards_adherence_report/components/details_drawer/statuses_info.js b/ee/app/assets/javascripts/compliance_dashboard/components/standards_adherence_report/components/details_drawer/statuses_info.js index bb070184b7637fd11988f52b14025a1a7de2d1b1..96332f2bd4e63f154629c73197d2f891ac025a46 100644 --- a/ee/app/assets/javascripts/compliance_dashboard/components/standards_adherence_report/components/details_drawer/statuses_info.js +++ b/ee/app/assets/javascripts/compliance_dashboard/components/standards_adherence_report/components/details_drawer/statuses_info.js @@ -241,23 +241,6 @@ export const statusesInfo = { }, ], }, - scanner_fuzz_testing_running: { - title: s__('ComplianceStandardsAdherence|Fuzz testing running'), - description: s__( - "ComplianceStandardsAdherence|Ensures fuzz testing is configured and running in the project's default branch pipeline.", - ), - fixes: [ - { - title: s__('ComplianceStandardsAdherence|Set up fuzz testing'), - description: s__( - 'ComplianceStandardsAdherence|Set up fuzz testing in your pipeline to identify edge cases and potential crashes.', - ), - linkTitle: __('Fuzz testing'), - ultimate: true, - link: helpPagePath('user/application_security/coverage_fuzzing/_index.md'), - }, - ], - }, scanner_code_quality_running: { title: s__('ComplianceStandardsAdherence|Code quality running'), description: s__( diff --git a/ee/app/validators/json_schemas/compliance_requirements_control_expression.json b/ee/app/validators/json_schemas/compliance_requirements_control_expression.json index f807d64899bc8fb7e3774b4ddfd1749237f2dbf4..ec15c38638a8a50a546bd6dc30ad6ef7f4a585af 100644 --- a/ee/app/validators/json_schemas/compliance_requirements_control_expression.json +++ b/ee/app/validators/json_schemas/compliance_requirements_control_expression.json @@ -19,7 +19,6 @@ "scanner_license_compliance_running", "scanner_dast_running", "scanner_api_security_running", - "scanner_fuzz_testing_running", "scanner_code_quality_running", "scanner_iac_running", "code_changes_requires_code_owners", @@ -112,7 +111,6 @@ "scanner_license_compliance_running", "scanner_dast_running", "scanner_api_security_running", - "scanner_fuzz_testing_running", "scanner_code_quality_running", "scanner_iac_running", "code_changes_requires_code_owners", diff --git a/ee/config/compliance_management/compliance_controls.yml b/ee/config/compliance_management/compliance_controls.yml index 5e5e8c6b272bf9a0273063e13efa9161f82c640b..c7c8afd1c0d3ccfb9920f8d8b4ee089050fab261 100644 --- a/ee/config/compliance_management/compliance_controls.yml +++ b/ee/config/compliance_management/compliance_controls.yml @@ -104,13 +104,6 @@ controls: compliant_operator: '=' field_method: scanner_api_security_running? enum_value: 12 - scanner_fuzz_testing_running: - name: Fuzz testing running - type: boolean - compliant_value: true - compliant_operator: '=' - field_method: scanner_fuzz_testing_running? - enum_value: 13 scanner_code_quality_running: name: Code quality running type: boolean diff --git a/ee/config/compliance_management/requirement_controls.json b/ee/config/compliance_management/requirement_controls.json index d18f9fdc931468cb557f0ad61d9477549db9960a..8d09d0eebe130a42610a7739897d1cf64f0d42c1 100644 --- a/ee/config/compliance_management/requirement_controls.json +++ b/ee/config/compliance_management/requirement_controls.json @@ -116,15 +116,6 @@ "value": true } }, - { - "id": "scanner_fuzz_testing_running", - "name": "Fuzz testing running", - "expression": { - "field": "scanner_fuzz_testing_running", - "operator": "=", - "value": true - } - }, { "id": "scanner_code_quality_running", "name": "Code quality running", diff --git a/ee/lib/compliance_management/compliance_requirements/project_fields.rb b/ee/lib/compliance_management/compliance_requirements/project_fields.rb index 9970de064f31da5ca88b0b652cd0ab30c6eddaf5..a71f5df831a0e8e7d90a903598554a075eb2ac7b 100644 --- a/ee/lib/compliance_management/compliance_requirements/project_fields.rb +++ b/ee/lib/compliance_management/compliance_requirements/project_fields.rb @@ -17,7 +17,6 @@ class ProjectFields :license_compliance, :dast, :api_fuzzing, - :fuzz_testing, :codequality, :iac ].freeze @@ -108,10 +107,6 @@ def scanner_api_security_running?(project, context = {}) security_scanner_running?(:api_fuzzing, project, context) end - def scanner_fuzz_testing_running?(project, context = {}) - security_scanner_running?(:fuzz_testing, project, context) - end - def scanner_code_quality_running?(project, context = {}) security_scanner_running?(:codequality, project, context) end diff --git a/ee/spec/lib/compliance_management/compliance_requirements/project_fields_spec.rb b/ee/spec/lib/compliance_management/compliance_requirements/project_fields_spec.rb index 3643b20457211cc46c04bb82567c566196c00bb9..9029ca21b24ea14022fbbd0ad00f1f67cfe09d59 100644 --- a/ee/spec/lib/compliance_management/compliance_requirements/project_fields_spec.rb +++ b/ee/spec/lib/compliance_management/compliance_requirements/project_fields_spec.rb @@ -27,7 +27,6 @@ 'scanner_license_compliance_running' => :scanner_license_compliance_running?, 'scanner_dast_running' => :scanner_dast_running?, 'scanner_api_security_running' => :scanner_api_security_running?, - 'scanner_fuzz_testing_running' => :scanner_fuzz_testing_running?, 'scanner_code_quality_running' => :scanner_code_quality_running?, 'scanner_iac_running' => :scanner_iac_running?, 'terraform_enabled' => :terraform_enabled?, @@ -57,7 +56,6 @@ 'scanner_license_compliance_running', 'scanner_dast_running', 'scanner_api_security_running', - 'scanner_fuzz_testing_running', 'scanner_code_quality_running', 'scanner_iac_running', 'project_repo_exists', @@ -440,14 +438,6 @@ end end - describe 'scanner_fuzz_testing_running' do - it 'calls security_scanner_running? with scanner type fuzz_testing' do - expect(described_class).to receive(:security_scanner_running?).with(:fuzz_testing, project, {}) - - described_class.map_field(project, 'scanner_fuzz_testing_running') - end - end - describe 'scanner_code_quality_running' do it 'calls security_scanner_running? with scanner type code_quality' do expect(described_class).to receive(:security_scanner_running?).with(:codequality, project, {}) diff --git a/locale/gitlab.pot b/locale/gitlab.pot index 42ef90be13d2308b982451c934efd47569be0e7c..d49aa464726b6b705afed98b336a02c0461cb72d 100644 --- a/locale/gitlab.pot +++ b/locale/gitlab.pot @@ -17041,9 +17041,6 @@ msgstr "" msgid "ComplianceStandardsAdherence|Ensures fewer administrators are assigned to the project than total members." msgstr "" -msgid "ComplianceStandardsAdherence|Ensures fuzz testing is configured and running in the project's default branch pipeline." -msgstr "" - msgid "ComplianceStandardsAdherence|Ensures inactive users are reviewed and removed." msgstr "" @@ -17170,9 +17167,6 @@ msgstr "" msgid "ComplianceStandardsAdherence|Frameworks" msgstr "" -msgid "ComplianceStandardsAdherence|Fuzz testing running" -msgstr "" - msgid "ComplianceStandardsAdherence|GitLab license level Ultimate" msgstr "" @@ -17503,12 +17497,6 @@ msgstr "" msgid "ComplianceStandardsAdherence|Set up error tracking to monitor and address application errors." msgstr "" -msgid "ComplianceStandardsAdherence|Set up fuzz testing" -msgstr "" - -msgid "ComplianceStandardsAdherence|Set up fuzz testing in your pipeline to identify edge cases and potential crashes." -msgstr "" - msgid "ComplianceStandardsAdherence|Set up license compliance scanning to identify potentially problematic open source licenses." msgstr "" @@ -28720,9 +28708,6 @@ msgstr "" msgid "Full log" msgstr "" -msgid "Fuzz testing" -msgstr "" - msgid "GCP region configured" msgstr ""