diff --git a/ee/app/assets/javascripts/security_orchestration/graphql/queries/group_scan_result_policies.query.graphql b/ee/app/assets/javascripts/security_orchestration/graphql/queries/group_scan_result_policies.query.graphql index 76d005eb2d3baba9dd33fab16c5f5ded8fd35186..8ec8a7c455e67e00e66cd85f5b0e93036b8b556c 100644 --- a/ee/app/assets/javascripts/security_orchestration/graphql/queries/group_scan_result_policies.query.graphql +++ b/ee/app/assets/javascripts/security_orchestration/graphql/queries/group_scan_result_policies.query.graphql @@ -32,17 +32,6 @@ query groupScanResultPolicies( name } } - userApprovers { - id - name - webUrl - } - allGroupApprovers { - id - fullPath - webUrl - } - roleApprovers policyScope { ...PolicyScope } diff --git a/ee/app/assets/javascripts/security_orchestration/graphql/queries/project_scan_result_policies.query.graphql b/ee/app/assets/javascripts/security_orchestration/graphql/queries/project_scan_result_policies.query.graphql index 7c9eb1fbc3af246b27eb0f81cb651c1f36c5dd4f..040cda4897443eab7ddf6a04a52884ec1e1c822d 100644 --- a/ee/app/assets/javascripts/security_orchestration/graphql/queries/project_scan_result_policies.query.graphql +++ b/ee/app/assets/javascripts/security_orchestration/graphql/queries/project_scan_result_policies.query.graphql @@ -35,17 +35,6 @@ query projectScanResultPolicies( name } } - userApprovers { - id - name - webUrl - } - allGroupApprovers { - id - fullPath - webUrl - } - roleApprovers source { ...SecurityPolicySource } diff --git a/ee/spec/frontend/security_orchestration/mocks/mock_scan_result_policy_data.js b/ee/spec/frontend/security_orchestration/mocks/mock_scan_result_policy_data.js index 018a81b7a6c401102e679c9631595b24532f3f13..b214ca54076a7c4455a6b892a4c6c28a3a1c00a4 100644 --- a/ee/spec/frontend/security_orchestration/mocks/mock_scan_result_policy_data.js +++ b/ee/spec/frontend/security_orchestration/mocks/mock_scan_result_policy_data.js @@ -245,9 +245,6 @@ export const mockProjectScanResultPolicy = { editPath: '/policies/policy-name/edit?type="approval_policy"', enabled: false, actionApprovers: [], - userApprovers: [], - allGroupApprovers: [], - roleApprovers: [], ...POLICY_SCOPE_MOCK, source: { __typename: 'ProjectSecurityPolicySource', @@ -266,9 +263,6 @@ export const mockGroupScanResultPolicy = { editPath: '/policies/policy-name/edit?type="approval_policy"', enabled: mockDefaultBranchesScanResultObject.enabled, actionApprovers: [], - userApprovers: [], - allGroupApprovers: [], - roleApprovers: [], ...POLICY_SCOPE_MOCK, source: { __typename: 'GroupSecurityPolicySource',