From 1f189b79b851b018b3eb76a44c88383a7b8902ca Mon Sep 17 00:00:00 2001 From: Zamir Martins Filho Date: Sun, 6 Feb 2022 12:24:43 -0500 Subject: [PATCH 1/7] Add approvers when editing scan result policies taking into consideration the existing feature flag. It also split a couple of fields which were previously only used for scan execution scan. Changelog: changed EE: true --- .../scan_execution_policy_editor.vue | 9 ++- .../scan_result_policy/lib/index.js | 5 +- .../scan_result_policy_editor.vue | 10 ++- .../threat_monitoring/policy_editor.js | 12 ++- .../projects/security/policies_controller.rb | 13 ++++ .../projects/security/policies_helper.rb | 9 ++- .../fetch_policy_approvers_service.rb | 43 ++++++++++ .../projects/security/policies/edit.html.haml | 2 +- .../scan_execution_policy_editor_spec.js | 15 ++-- .../scan_result_policy_editor_spec.js | 17 ++-- .../projects/security/policies_helper_spec.rb | 9 ++- .../security/policies_controller_spec.rb | 64 ++++++++++++++- .../fetch_policy_approvers_service_spec.rb | 78 +++++++++++++++++++ 13 files changed, 245 insertions(+), 41 deletions(-) create mode 100644 ee/app/services/security/security_orchestration_policies/fetch_policy_approvers_service.rb create mode 100644 ee/spec/services/security/security_orchestration_policies/fetch_policy_approvers_service_spec.rb diff --git a/ee/app/assets/javascripts/threat_monitoring/components/policy_editor/scan_execution_policy/scan_execution_policy_editor.vue b/ee/app/assets/javascripts/threat_monitoring/components/policy_editor/scan_execution_policy/scan_execution_policy_editor.vue index d47a325360ab5c..c0ed179af257f2 100644 --- a/ee/app/assets/javascripts/threat_monitoring/components/policy_editor/scan_execution_policy/scan_execution_policy_editor.vue +++ b/ee/app/assets/javascripts/threat_monitoring/components/policy_editor/scan_execution_policy/scan_execution_policy_editor.vue @@ -28,11 +28,11 @@ export default { PolicyEditorLayout, }, inject: [ - 'disableScanExecutionUpdate', + 'disableScanPolicyUpdate', 'policyEditorEmptyStateSvgPath', 'projectId', 'projectPath', - 'scanExecutionDocumentationPath', + 'scanPolicyDocumentationPath', ], props: { assignedPolicyProject: { @@ -62,6 +62,7 @@ export default { newlyCreatedPolicyProject: null, policy: fromYaml(yamlEditorValue), yamlEditorValue, + documentationPath: `${this.scanPolicyDocumentationPath}#scan-execution-policy-editor`, }; }, computed: { @@ -137,7 +138,7 @@ export default {