From 039e33ce1dccb03106e70a60662f467363794c38 Mon Sep 17 00:00:00 2001
From: Sam White <swhite@gitlab.com>
Date: Wed, 1 Mar 2023 03:05:14 +0000
Subject: [PATCH] Enable rule mode SEP UI for SAST IaC

Changelog: added
EE: true
---
 .../security_configuration/components/constants.js        | 2 +-
 .../components/policy_editor/policy_selection.vue         | 2 +-
 .../policy_editor/scan_execution_policy/constants.js      | 2 ++
 locale/gitlab.pot                                         | 8 ++++----
 4 files changed, 8 insertions(+), 6 deletions(-)

diff --git a/app/assets/javascripts/security_configuration/components/constants.js b/app/assets/javascripts/security_configuration/components/constants.js
index c87dcef6a93ed..7b0ade09dffce 100644
--- a/app/assets/javascripts/security_configuration/components/constants.js
+++ b/app/assets/javascripts/security_configuration/components/constants.js
@@ -35,7 +35,7 @@ export const SAST_CONFIG_HELP_PATH = helpPagePath('user/application_security/sas
 });
 
 export const SAST_IAC_NAME = __('Infrastructure as Code (IaC) Scanning');
-export const SAST_IAC_SHORT_NAME = s__('ciReport|IaC Scanning');
+export const SAST_IAC_SHORT_NAME = s__('ciReport|SAST IaC');
 export const SAST_IAC_DESCRIPTION = __(
   'Analyze your infrastructure as code configuration files for known vulnerabilities.',
 );
diff --git a/ee/app/assets/javascripts/security_orchestration/components/policy_editor/policy_selection.vue b/ee/app/assets/javascripts/security_orchestration/components/policy_editor/policy_selection.vue
index 967fa6d8e7bfa..7708604a1120c 100644
--- a/ee/app/assets/javascripts/security_orchestration/components/policy_editor/policy_selection.vue
+++ b/ee/app/assets/javascripts/security_orchestration/components/policy_editor/policy_selection.vue
@@ -24,7 +24,7 @@ const i18n = {
   ),
   scanExecutionPolicyTitle: s__('SecurityOrchestration|Scan execution policy'),
   scanExecutionPolicyDesc: s__(
-    'SecurityOrchestration|Use a scan execution policy to create rules which enforce security scans for particular branches at a certain time. Supported types are SAST, DAST, Secret detection, Container scanning, and Dependency scanning.',
+    'SecurityOrchestration|Use a scan execution policy to create rules which enforce security scans for particular branches at a certain time. Supported types are SAST, SAST IaC, DAST, Secret detection, Container scanning, and Dependency scanning.',
   ),
   scanExecutionPolicyExample: s__(
     'SecurityOrchestration|Run a DAST scan with Scan Profile A and Site Profile A when a pipeline run against the main branch.',
diff --git a/ee/app/assets/javascripts/security_orchestration/components/policy_editor/scan_execution_policy/constants.js b/ee/app/assets/javascripts/security_orchestration/components/policy_editor/scan_execution_policy/constants.js
index af700f2f0eb4e..21d85071930fc 100644
--- a/ee/app/assets/javascripts/security_orchestration/components/policy_editor/scan_execution_policy/constants.js
+++ b/ee/app/assets/javascripts/security_orchestration/components/policy_editor/scan_execution_policy/constants.js
@@ -5,6 +5,7 @@ import {
   DEPENDENCY_SCANNING_NAME,
   SECRET_DETECTION_NAME,
   CONTAINER_SCANNING_NAME,
+  SAST_IAC_SHORT_NAME,
 } from '~/security_configuration/components/constants';
 
 export const SCANNER_DAST = 'dast';
@@ -44,6 +45,7 @@ export const DAST_HUMANIZED_TEMPLATE = s__(
 
 export const RULE_MODE_SCANNERS = {
   sast: SAST_SHORT_NAME,
+  sast_iac: SAST_IAC_SHORT_NAME,
   dast: DAST_SHORT_NAME,
   secret_detection: SECRET_DETECTION_NAME,
   container_scanning: CONTAINER_SCANNING_NAME,
diff --git a/locale/gitlab.pot b/locale/gitlab.pot
index 2a02f76fa6496..d985627e7e75a 100644
--- a/locale/gitlab.pot
+++ b/locale/gitlab.pot
@@ -38883,7 +38883,7 @@ msgstr ""
 msgid "SecurityOrchestration|Update scan policies"
 msgstr ""
 
-msgid "SecurityOrchestration|Use a scan execution policy to create rules which enforce security scans for particular branches at a certain time. Supported types are SAST, DAST, Secret detection, Container scanning, and Dependency scanning."
+msgid "SecurityOrchestration|Use a scan execution policy to create rules which enforce security scans for particular branches at a certain time. Supported types are SAST, SAST IaC, DAST, Secret detection, Container scanning, and Dependency scanning."
 msgstr ""
 
 msgid "SecurityOrchestration|Use a scan result policy to create rules that check for security vulnerabilities and license compliance before merging a merge request."
@@ -50616,9 +50616,6 @@ msgstr ""
 msgid "ciReport|Generic Report"
 msgstr ""
 
-msgid "ciReport|IaC Scanning"
-msgstr ""
-
 msgid "ciReport|Investigate this vulnerability by creating an issue"
 msgstr ""
 
@@ -50684,6 +50681,9 @@ msgstr ""
 msgid "ciReport|SAST"
 msgstr ""
 
+msgid "ciReport|SAST IaC"
+msgstr ""
+
 msgid "ciReport|Secret Detection"
 msgstr ""
 
-- 
GitLab