Skip to content
代码片段 群组 项目
未验证 提交 32101ca8 编辑于 作者: Alexander Turinske's avatar Alexander Turinske 提交者: GitLab
浏览文件

Merge branch '498624-update-frontend-wording' into 'master'

Update policy_tuning wording to account for pipeline execution policies

See merge request https://gitlab.com/gitlab-org/gitlab/-/merge_requests/183840



Merged-by: default avatarAlexander Turinske <aturinske@gitlab.com>
Approved-by: default avatarAlexander Turinske <aturinske@gitlab.com>
Reviewed-by: default avatarAlexander Turinske <aturinske@gitlab.com>
Reviewed-by: default avatarMartin Čavoj <mcavoj@gitlab.com>
Co-authored-by: default avatarMartin Čavoj <mcavoj@gitlab.com>
No related branches found
No related tags found
2 合并请求!3031Merge per-main-jh to main-jh by luzhiyuan,!3030Merge per-main-jh to main-jh
...@@ -7,5 +7,5 @@ export const OPEN = 'open'; ...@@ -7,5 +7,5 @@ export const OPEN = 'open';
export const UNBLOCK_RULES_KEY = 'unblock_rules_using_execution_policies'; export const UNBLOCK_RULES_KEY = 'unblock_rules_using_execution_policies';
export const UNBLOCK_RULES_TEXT = s__( export const UNBLOCK_RULES_TEXT = s__(
'ScanResultPolicy|Make approval rules optional using scan execution policies', 'ScanResultPolicy|Make approval rules optional using execution policies',
); );
...@@ -8,7 +8,7 @@ export default { ...@@ -8,7 +8,7 @@ export default {
UNBLOCK_RULES_TEXT, UNBLOCK_RULES_TEXT,
popoverTitle: __('Information'), popoverTitle: __('Information'),
popoverDesc: s__( popoverDesc: s__(
'ScanResultPolicy|Automatically make approval rules optional when scan artifacts are missing from the target branch and a scan is required by a scan execution policy. This option only works with an existing scan execution policy that has matching scanners.', 'ScanResultPolicy|When enabled, approval rules do not block merge requests when a scan is required by a scan execution policy or a pipeline execution policy but a required scan artifact is missing from the target branch. This option only works when the project or group has an existing scan execution policy or pipeline execution policy with matching scanners.',
), ),
}, },
components: { components: {
......
...@@ -21,7 +21,7 @@ describe('EdgeCasesSection', () => { ...@@ -21,7 +21,7 @@ describe('EdgeCasesSection', () => {
it('renders the checkbox', () => { it('renders the checkbox', () => {
expect(findCheckbox().text()).toContain( expect(findCheckbox().text()).toContain(
'Make approval rules optional using scan execution policies', 'Make approval rules optional using execution policies',
); );
expect(findCheckbox().attributes('checked')).toBeUndefined(); expect(findCheckbox().attributes('checked')).toBeUndefined();
}); });
......
...@@ -51362,9 +51362,6 @@ msgstr "" ...@@ -51362,9 +51362,6 @@ msgstr ""
msgid "ScanResultPolicy|Attributes are automatically applied by the scanners" msgid "ScanResultPolicy|Attributes are automatically applied by the scanners"
msgstr "" msgstr ""
   
msgid "ScanResultPolicy|Automatically make approval rules optional when scan artifacts are missing from the target branch and a scan is required by a scan execution policy. This option only works with an existing scan execution policy that has matching scanners."
msgstr ""
msgid "ScanResultPolicy|Block the merge request until all criteria are met" msgid "ScanResultPolicy|Block the merge request until all criteria are met"
msgstr "" msgstr ""
   
...@@ -51467,7 +51464,7 @@ msgstr "" ...@@ -51467,7 +51464,7 @@ msgstr ""
msgid "ScanResultPolicy|License type" msgid "ScanResultPolicy|License type"
msgstr "" msgstr ""
   
msgid "ScanResultPolicy|Make approval rules optional using scan execution policies" msgid "ScanResultPolicy|Make approval rules optional using execution policies"
msgstr "" msgstr ""
   
msgid "ScanResultPolicy|Matching" msgid "ScanResultPolicy|Matching"
...@@ -51599,6 +51596,9 @@ msgstr "" ...@@ -51599,6 +51596,9 @@ msgstr ""
msgid "ScanResultPolicy|When a security policy fails for an unspecified reason." msgid "ScanResultPolicy|When a security policy fails for an unspecified reason."
msgstr "" msgstr ""
   
msgid "ScanResultPolicy|When enabled, approval rules do not block merge requests when a scan is required by a scan execution policy or a pipeline execution policy but a required scan artifact is missing from the target branch. This option only works when the project or group has an existing scan execution policy or pipeline execution policy with matching scanners."
msgstr ""
msgid "ScanResultPolicy|When enabled, if an MR receives all necessary approvals to merge, but then a new commit is added, new approvals are required." msgid "ScanResultPolicy|When enabled, if an MR receives all necessary approvals to merge, but then a new commit is added, new approvals are required."
msgstr "" msgstr ""
   
0% 加载中 .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册