diff --git a/ee/app/graphql/resolvers/concerns/construct_security_policies.rb b/ee/app/graphql/resolvers/concerns/construct_security_policies.rb index 26640ca3c163efdc66935050dd185dd730607238..e144ccb0be863ad79c7e94cbd2175137b0b8f47c 100644 --- a/ee/app/graphql/resolvers/concerns/construct_security_policies.rb +++ b/ee/app/graphql/resolvers/concerns/construct_security_policies.rb @@ -29,7 +29,7 @@ def construct_scan_result_policies(policies) { name: policy[:name], description: policy[:description], - edit_path: edit_path(policy, :scan_result_policy), + edit_path: edit_path(policy, :approval_policy), enabled: policy[:enabled], yaml: YAML.dump(policy.slice(*POLICY_YAML_ATTRIBUTES).deep_stringify_keys), updated_at: policy[:config].policy_last_updated_at, diff --git a/ee/spec/graphql/resolvers/compliance_management/security_policies/scan_result_policy_resolver_spec.rb b/ee/spec/graphql/resolvers/compliance_management/security_policies/scan_result_policy_resolver_spec.rb index b6c52fb01d0e41e0213a0e70f9b024a0a27a27ba..6bba39941b9c12567dd46ec7b71d91aaa8213c31 100644 --- a/ee/spec/graphql/resolvers/compliance_management/security_policies/scan_result_policy_resolver_spec.rb +++ b/ee/spec/graphql/resolvers/compliance_management/security_policies/scan_result_policy_resolver_spec.rb @@ -41,7 +41,7 @@ name: policy[:name], description: policy[:description], edit_path: Gitlab::Routing.url_helpers.edit_project_security_policy_url( - project, id: CGI.escape(policy[:name]), type: 'scan_result_policy' + project, id: CGI.escape(policy[:name]), type: 'approval_policy' ), enabled: policy[:enabled], yaml: YAML.dump(policy.deep_stringify_keys), diff --git a/ee/spec/graphql/resolvers/security_orchestration/scan_result_policy_resolver_spec.rb b/ee/spec/graphql/resolvers/security_orchestration/scan_result_policy_resolver_spec.rb index b02cc856c22afc02875fe3a1b9faf0a92f38cd6b..0c0199318d3cec6beff6e3e91b34cdef228dd0ba 100644 --- a/ee/spec/graphql/resolvers/security_orchestration/scan_result_policy_resolver_spec.rb +++ b/ee/spec/graphql/resolvers/security_orchestration/scan_result_policy_resolver_spec.rb @@ -15,7 +15,7 @@ name: 'Require security approvals', description: 'This policy considers only container scanning and critical severities', edit_path: Gitlab::Routing.url_helpers.edit_project_security_policy_url( - project, id: CGI.escape(policy[:name]), type: 'scan_result_policy' + project, id: CGI.escape(policy[:name]), type: 'approval_policy' ), enabled: true, yaml: YAML.dump(policy.deep_stringify_keys),