From 9339da9da9be46bcf2801d56f52b89a00d0e350d Mon Sep 17 00:00:00 2001 From: Roshni Sarangadharan Date: Wed, 17 Dec 2025 16:16:06 +0530 Subject: [PATCH] Sentence case for container scanning for registry --- doc/api/graphql/reference/_index.md | 6 +++--- doc/user/application_security/container_scanning/_index.md | 2 +- .../continuous_vulnerability_scanning/_index.md | 2 +- ee/app/graphql/ee/types/project_type.rb | 2 +- .../ci_configuration/set_container_scanning_for_registry.rb | 4 ++-- 5 files changed, 8 insertions(+), 8 deletions(-) diff --git a/doc/api/graphql/reference/_index.md b/doc/api/graphql/reference/_index.md index 6658c30c6e397f..acd9f239d04297 100644 --- a/doc/api/graphql/reference/_index.md +++ b/doc/api/graphql/reference/_index.md @@ -12576,7 +12576,7 @@ Input type: `SecurityTrainingUpdateInput` ### `Mutation.setContainerScanningForRegistry` -Enable/disable Container Scanning for Registry for the given project. +Enable/disable container scanning for registry for the given project. Input type: `SetContainerScanningForRegistryInput` @@ -12585,7 +12585,7 @@ Input type: `SetContainerScanningForRegistryInput` | Name | Type | Description | | ---- | ---- | ----------- | | `clientMutationId` | [`String`](#string) | A unique identifier for the client performing the mutation. | -| `enable` | [`Boolean!`](#boolean) | Desired status for Container Scanning for Registry feature. | +| `enable` | [`Boolean!`](#boolean) | Desired status for container scanning for registry feature. | | `namespacePath` | [`ID!`](#id) | Full path of the namespace (project). | #### Fields @@ -42056,7 +42056,7 @@ Project-level settings for product analytics provider. | `containerProtectionTagRules` {{< icon name="warning-solid" >}} | [`ContainerProtectionTagRuleConnection`](#containerprotectiontagruleconnection) | **Introduced** in GitLab 17.8. **Status**: Experiment. Container repository tag protection rules for the project. | | `containerRegistryEnabled` | [`Boolean`](#boolean) | Indicates if Container registry is enabled for the current user. | | `containerRepositoriesCount` | [`Int!`](#int) | Number of container repositories in the project. | -| `containerScanningForRegistryEnabled` | [`Boolean`](#boolean) | Indicates whether Container Scanning for Registry is enabled or not for the project. Returns `null` if unauthorized. | +| `containerScanningForRegistryEnabled` | [`Boolean`](#boolean) | Indicates whether container scanning for registry is enabled or not for the project. Returns `null` if unauthorized. | | `containerTagsExpirationPolicy` | [`ContainerTagsExpirationPolicy`](#containertagsexpirationpolicy) | Container tags expiration policy of the project. | | `corpuses` | [`CoverageFuzzingCorpusConnection`](#coveragefuzzingcorpusconnection) | Find corpuses of the project. (see [Connections](#connections)) | | `createdAt` | [`Time`](#time) | Timestamp of the project creation. | diff --git a/doc/user/application_security/container_scanning/_index.md b/doc/user/application_security/container_scanning/_index.md index f689a518158989..7dacf36d784eb8 100644 --- a/doc/user/application_security/container_scanning/_index.md +++ b/doc/user/application_security/container_scanning/_index.md @@ -959,7 +959,7 @@ Container scanning for registry populates the vulnerability report only when a n {{< alert type="warning" >}} -Vulnerabilities detected by Container Scanning for Registry cannot be automatically marked as +Vulnerabilities detected by container scanning for registry cannot be automatically marked as resolved when you update or remove vulnerable components. These vulnerabilities remain visible indefinitely because this feature only generates SBOMs, not the security reports required for vulnerability resolution. diff --git a/doc/user/application_security/continuous_vulnerability_scanning/_index.md b/doc/user/application_security/continuous_vulnerability_scanning/_index.md index f43c995839d9c8..b9b9563cd2a465 100644 --- a/doc/user/application_security/continuous_vulnerability_scanning/_index.md +++ b/doc/user/application_security/continuous_vulnerability_scanning/_index.md @@ -108,7 +108,7 @@ by GitLab (`Trivy`, `gemnasium`, `gemnasium-python`, `gemnasium-maven`). {{< alert type="warning" >}} -Vulnerabilities detected through Container Scanning for Registry cannot be resolved using this +Vulnerabilities detected through container scanning for registry cannot be resolved using this method and remain visible even after you fix them in your images. This occurs because Container Scanning for Registry generates only SBOMs, not the security reports required to mark vulnerabilities as resolved. diff --git a/ee/app/graphql/ee/types/project_type.rb b/ee/app/graphql/ee/types/project_type.rb index b120e9c664b2e2..311df861dd28e9 100644 --- a/ee/app/graphql/ee/types/project_type.rb +++ b/ee/app/graphql/ee/types/project_type.rb @@ -513,7 +513,7 @@ module ProjectType field :container_scanning_for_registry_enabled, GraphQL::Types::Boolean, null: true, - description: 'Indicates whether Container Scanning for Registry is enabled or not for the project. ' \ + description: 'Indicates whether container scanning for registry is enabled or not for the project. ' \ 'Returns `null` if unauthorized.', authorize: :read_security_configuration diff --git a/ee/app/graphql/mutations/security/ci_configuration/set_container_scanning_for_registry.rb b/ee/app/graphql/mutations/security/ci_configuration/set_container_scanning_for_registry.rb index 96f7ddaf351e79..1a3717680d6dfc 100644 --- a/ee/app/graphql/mutations/security/ci_configuration/set_container_scanning_for_registry.rb +++ b/ee/app/graphql/mutations/security/ci_configuration/set_container_scanning_for_registry.rb @@ -9,7 +9,7 @@ class SetContainerScanningForRegistry < BaseMutation include FindsNamespace description <<~DESC - Enable/disable Container Scanning for Registry for the given project. + Enable/disable container scanning for registry for the given project. DESC argument :namespace_path, GraphQL::Types::ID, @@ -18,7 +18,7 @@ class SetContainerScanningForRegistry < BaseMutation argument :enable, GraphQL::Types::Boolean, required: true, - description: 'Desired status for Container Scanning for Registry feature.' + description: 'Desired status for container scanning for registry feature.' field :container_scanning_for_registry_enabled, GraphQL::Types::Boolean, null: true, -- GitLab