Commit 44e545be authored by Neil McCorrison's avatar Neil McCorrison Committed by Luke Duncalfe

Small text updates on the SAST Config UI page

https://gitlab.com/gitlab-org/gitlab/-/issues/326417
parent b68039ed
......@@ -51,36 +51,36 @@
],
"analyzers": [
{
"name": "brakeman",
"label": "Brakeman",
"name": "bandit",
"label": "Bandit",
"enabled" : true,
"description": "Ruby on Rails",
"description": "Python",
"variables": [
{
"field" : "SAST_BRAKEMAN_LEVEL",
"label" : "Brakeman confidence level.",
"field" : "SAST_BANDIT_EXCLUDED_PATHS",
"label" : "Paths to exclude from scan",
"type": "string",
"default_value": "1",
"default_value": "",
"value": "",
"size": "SMALL",
"description": "Ignore Brakeman vulnerabilities under given confidence level. Integer, 1=Low, 2=Medium, 3=High."
"description": "Comma-separated list of paths to exclude from scan. Uses Python’s 'fnmatch' syntax; For example: '*/tests/*, */venv/*'"
}
]
},
{
"name": "bandit",
"label": "Bandit",
"name": "brakeman",
"label": "Brakeman",
"enabled" : true,
"description": "Python",
"description": "Ruby on Rails",
"variables": [
{
"field" : "SAST_BANDIT_EXCLUDED_PATHS",
"label" : "Paths to exclude from scan.",
"field" : "SAST_BRAKEMAN_LEVEL",
"label" : "Brakeman confidence level",
"type": "string",
"default_value": "",
"default_value": "1",
"value": "",
"size": "SMALL",
"description": "Comma-separated list of paths to exclude from scan. Uses Python’s 'fnmatch' syntax; For example: '*/tests/*, */venv/*'"
"description": "Ignore Brakeman vulnerabilities under given confidence level. Integer, 1=Low, 2=Medium, 3=High."
}
]
},
......@@ -110,7 +110,7 @@
},
{
"name": "kubesec",
"label": "kubesec",
"label": "Kubesec",
"enabled" : true,
"description": "Kubernetes manifests, Helm Charts",
"variables": []
......@@ -124,7 +124,7 @@
},
{
"name": "gosec",
"label": "Golang Security Checker",
"label": "Gosec",
"enabled" : true,
"description": "Go",
"variables": [
......
---
title: Small text updates on the SAST Config UI page
merge_request: 58188
author:
type: changed
......@@ -125,8 +125,8 @@ RSpec.describe GitlabSchema.types['Project'] do
it "returns the project's sast configuration for analyzer variables" do
analyzer = subject.dig('data', 'project', 'sastCiConfiguration', 'analyzers', 'nodes').first
expect(analyzer['name']).to eq('brakeman')
expect(analyzer['label']).to eq('Brakeman')
expect(analyzer['name']).to eq('bandit')
expect(analyzer['label']).to eq('Bandit')
expect(analyzer['enabled']).to eq(true)
end
......
......@@ -12,8 +12,8 @@ RSpec.describe Security::CiConfiguration::SastParserService do
let(:sast_analyzer_image_tag) { configuration['global'][2] }
let(:sast_pipeline_stage) { configuration['pipeline'][0] }
let(:sast_search_max_depth) { configuration['pipeline'][1] }
let(:brakeman) { configuration['analyzers'][0] }
let(:bandit) { configuration['analyzers'][1] }
let(:bandit) { configuration['analyzers'][0] }
let(:brakeman) { configuration['analyzers'][1] }
let(:sast_brakeman_level) { brakeman['variables'][0] }
it 'parses the configuration for SAST' do
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment