From 039e33ce1dccb03106e70a60662f467363794c38 Mon Sep 17 00:00:00 2001 From: Sam White <swhite@gitlab.com> Date: Wed, 1 Mar 2023 03:05:14 +0000 Subject: [PATCH] Enable rule mode SEP UI for SAST IaC Changelog: added EE: true --- .../security_configuration/components/constants.js | 2 +- .../components/policy_editor/policy_selection.vue | 2 +- .../policy_editor/scan_execution_policy/constants.js | 2 ++ locale/gitlab.pot | 8 ++++---- 4 files changed, 8 insertions(+), 6 deletions(-) diff --git a/app/assets/javascripts/security_configuration/components/constants.js b/app/assets/javascripts/security_configuration/components/constants.js index c87dcef6a93ed..7b0ade09dffce 100644 --- a/app/assets/javascripts/security_configuration/components/constants.js +++ b/app/assets/javascripts/security_configuration/components/constants.js @@ -35,7 +35,7 @@ export const SAST_CONFIG_HELP_PATH = helpPagePath('user/application_security/sas }); export const SAST_IAC_NAME = __('Infrastructure as Code (IaC) Scanning'); -export const SAST_IAC_SHORT_NAME = s__('ciReport|IaC Scanning'); +export const SAST_IAC_SHORT_NAME = s__('ciReport|SAST IaC'); export const SAST_IAC_DESCRIPTION = __( 'Analyze your infrastructure as code configuration files for known vulnerabilities.', ); diff --git a/ee/app/assets/javascripts/security_orchestration/components/policy_editor/policy_selection.vue b/ee/app/assets/javascripts/security_orchestration/components/policy_editor/policy_selection.vue index 967fa6d8e7bfa..7708604a1120c 100644 --- a/ee/app/assets/javascripts/security_orchestration/components/policy_editor/policy_selection.vue +++ b/ee/app/assets/javascripts/security_orchestration/components/policy_editor/policy_selection.vue @@ -24,7 +24,7 @@ const i18n = { ), scanExecutionPolicyTitle: s__('SecurityOrchestration|Scan execution policy'), scanExecutionPolicyDesc: s__( - 'SecurityOrchestration|Use a scan execution policy to create rules which enforce security scans for particular branches at a certain time. Supported types are SAST, DAST, Secret detection, Container scanning, and Dependency scanning.', + 'SecurityOrchestration|Use a scan execution policy to create rules which enforce security scans for particular branches at a certain time. Supported types are SAST, SAST IaC, DAST, Secret detection, Container scanning, and Dependency scanning.', ), scanExecutionPolicyExample: s__( 'SecurityOrchestration|Run a DAST scan with Scan Profile A and Site Profile A when a pipeline run against the main branch.', diff --git a/ee/app/assets/javascripts/security_orchestration/components/policy_editor/scan_execution_policy/constants.js b/ee/app/assets/javascripts/security_orchestration/components/policy_editor/scan_execution_policy/constants.js index af700f2f0eb4e..21d85071930fc 100644 --- a/ee/app/assets/javascripts/security_orchestration/components/policy_editor/scan_execution_policy/constants.js +++ b/ee/app/assets/javascripts/security_orchestration/components/policy_editor/scan_execution_policy/constants.js @@ -5,6 +5,7 @@ import { DEPENDENCY_SCANNING_NAME, SECRET_DETECTION_NAME, CONTAINER_SCANNING_NAME, + SAST_IAC_SHORT_NAME, } from '~/security_configuration/components/constants'; export const SCANNER_DAST = 'dast'; @@ -44,6 +45,7 @@ export const DAST_HUMANIZED_TEMPLATE = s__( export const RULE_MODE_SCANNERS = { sast: SAST_SHORT_NAME, + sast_iac: SAST_IAC_SHORT_NAME, dast: DAST_SHORT_NAME, secret_detection: SECRET_DETECTION_NAME, container_scanning: CONTAINER_SCANNING_NAME, diff --git a/locale/gitlab.pot b/locale/gitlab.pot index 2a02f76fa6496..d985627e7e75a 100644 --- a/locale/gitlab.pot +++ b/locale/gitlab.pot @@ -38883,7 +38883,7 @@ msgstr "" msgid "SecurityOrchestration|Update scan policies" msgstr "" -msgid "SecurityOrchestration|Use a scan execution policy to create rules which enforce security scans for particular branches at a certain time. Supported types are SAST, DAST, Secret detection, Container scanning, and Dependency scanning." +msgid "SecurityOrchestration|Use a scan execution policy to create rules which enforce security scans for particular branches at a certain time. Supported types are SAST, SAST IaC, DAST, Secret detection, Container scanning, and Dependency scanning." msgstr "" msgid "SecurityOrchestration|Use a scan result policy to create rules that check for security vulnerabilities and license compliance before merging a merge request." @@ -50616,9 +50616,6 @@ msgstr "" msgid "ciReport|Generic Report" msgstr "" -msgid "ciReport|IaC Scanning" -msgstr "" - msgid "ciReport|Investigate this vulnerability by creating an issue" msgstr "" @@ -50684,6 +50681,9 @@ msgstr "" msgid "ciReport|SAST" msgstr "" +msgid "ciReport|SAST IaC" +msgstr "" + msgid "ciReport|Secret Detection" msgstr "" -- GitLab