Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
f4cc5194
Commit
f4cc5194
authored
Sep 16, 2021
by
Adam Cohen
Committed by
Terri Chu
Sep 16, 2021
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Remove cross-table security_report query
parent
9cb5a4eb
Changes
8
Show whitespace changes
Inline
Side-by-side
Showing
8 changed files
with
36 additions
and
25 deletions
+36
-25
app/models/ci/job_artifact.rb
app/models/ci/job_artifact.rb
+0
-1
ee/app/finders/ee/group_projects_finder.rb
ee/app/finders/ee/group_projects_finder.rb
+3
-3
ee/app/models/ee/project.rb
ee/app/models/ee/project.rb
+1
-1
ee/app/models/security/scan.rb
ee/app/models/security/scan.rb
+2
-0
ee/spec/factories/projects.rb
ee/spec/factories/projects.rb
+6
-0
ee/spec/finders/group_projects_finder_spec.rb
ee/spec/finders/group_projects_finder_spec.rb
+6
-10
ee/spec/models/project_spec.rb
ee/spec/models/project_spec.rb
+12
-0
ee/spec/requests/api/groups_spec.rb
ee/spec/requests/api/groups_spec.rb
+6
-10
No files found.
app/models/ci/job_artifact.rb
View file @
f4cc5194
...
@@ -185,7 +185,6 @@ module Ci
...
@@ -185,7 +185,6 @@ module Ci
scope
:order_expired_desc
,
->
{
order
(
expire_at: :desc
)
}
scope
:order_expired_desc
,
->
{
order
(
expire_at: :desc
)
}
scope
:with_destroy_preloads
,
->
{
includes
(
project:
[
:route
,
:statistics
])
}
scope
:with_destroy_preloads
,
->
{
includes
(
project:
[
:route
,
:statistics
])
}
scope
:scoped_project
,
->
{
where
(
'ci_job_artifacts.project_id = projects.id'
)
}
scope
:for_project
,
->
(
project
)
{
where
(
project_id:
project
)
}
scope
:for_project
,
->
(
project
)
{
where
(
project_id:
project
)
}
scope
:created_in_time_range
,
->
(
from:
nil
,
to:
nil
)
{
where
(
created_at:
from
..
to
)
}
scope
:created_in_time_range
,
->
(
from:
nil
,
to:
nil
)
{
where
(
created_at:
from
..
to
)
}
...
...
ee/app/finders/ee/group_projects_finder.rb
View file @
f4cc5194
...
@@ -14,12 +14,12 @@ module EE
...
@@ -14,12 +14,12 @@ module EE
override
:filter_projects
override
:filter_projects
def
filter_projects
(
collection
)
def
filter_projects
(
collection
)
collection
=
super
(
collection
)
collection
=
super
(
collection
)
by_security_
report
s_presence
(
collection
)
by_security_
scan
s_presence
(
collection
)
end
end
def
by_security_
report
s_presence
(
collection
)
def
by_security_
scan
s_presence
(
collection
)
if
params
[
:with_security_reports
]
&&
group
.
licensed_feature_available?
(
:security_dashboard
)
if
params
[
:with_security_reports
]
&&
group
.
licensed_feature_available?
(
:security_dashboard
)
collection
.
with_security_
report
s
collection
.
with_security_
scan
s
else
else
collection
collection
end
end
...
...
ee/app/models/ee/project.rb
View file @
f4cc5194
...
@@ -138,7 +138,7 @@ module EE
...
@@ -138,7 +138,7 @@ module EE
scope
:with_repositories_enabled
,
->
{
joins
(
:project_feature
).
where
(
project_features:
{
repository_access_level:
::
ProjectFeature
::
ENABLED
})
}
scope
:with_repositories_enabled
,
->
{
joins
(
:project_feature
).
where
(
project_features:
{
repository_access_level:
::
ProjectFeature
::
ENABLED
})
}
scope
:with_security_reports_stored
,
->
{
where
(
'EXISTS (?)'
,
::
Vulnerabilities
::
Finding
.
scoped_project
.
select
(
1
))
}
scope
:with_security_reports_stored
,
->
{
where
(
'EXISTS (?)'
,
::
Vulnerabilities
::
Finding
.
scoped_project
.
select
(
1
))
}
scope
:with_security_
reports
,
->
{
where
(
'EXISTS (?)'
,
::
Ci
::
JobArtifact
.
security_reports
.
scoped_project
.
select
(
1
))
}
scope
:with_security_
scans
,
->
{
where
(
'EXISTS (?)'
,
Security
::
Scan
.
scoped_project
.
select
(
1
))
}
scope
:with_github_integration_pipeline_events
,
->
{
joins
(
:github_integration
).
merge
(
::
Integrations
::
Github
.
pipeline_hooks
)
}
scope
:with_github_integration_pipeline_events
,
->
{
joins
(
:github_integration
).
merge
(
::
Integrations
::
Github
.
pipeline_hooks
)
}
scope
:with_active_prometheus_integration
,
->
{
joins
(
:prometheus_integration
).
merge
(
::
Integrations
::
Prometheus
.
active
)
}
scope
:with_active_prometheus_integration
,
->
{
joins
(
:prometheus_integration
).
merge
(
::
Integrations
::
Prometheus
.
active
)
}
scope
:with_enabled_incident_sla
,
->
{
joins
(
:incident_management_setting
).
where
(
project_incident_management_settings:
{
sla_timer:
true
})
}
scope
:with_enabled_incident_sla
,
->
{
joins
(
:incident_management_setting
).
where
(
project_incident_management_settings:
{
sla_timer:
true
})
}
...
...
ee/app/models/security/scan.rb
View file @
f4cc5194
...
@@ -29,6 +29,8 @@ module Security
...
@@ -29,6 +29,8 @@ module Security
scope
:by_scan_types
,
->
(
scan_types
)
{
where
(
scan_type:
scan_types
)
}
scope
:by_scan_types
,
->
(
scan_types
)
{
where
(
scan_type:
scan_types
)
}
scope
:scoped_project
,
->
{
where
(
'security_scans.project_id = projects.id'
)
}
scope
:has_dismissal_feedback
,
->
do
scope
:has_dismissal_feedback
,
->
do
# The `category` enum on `vulnerability_feedback` table starts from 0 but the `scan_type` enum
# The `category` enum on `vulnerability_feedback` table starts from 0 but the `scan_type` enum
# on `security_scans` from 1. For this reason, we have to decrease the value of `scan_type` by one
# on `security_scans` from 1. For this reason, we have to decrease the value of `scan_type` by one
...
...
ee/spec/factories/projects.rb
View file @
f4cc5194
...
@@ -39,6 +39,12 @@ FactoryBot.modify do
...
@@ -39,6 +39,12 @@ FactoryBot.modify do
end
end
end
end
trait
:with_security_scans
do
after
(
:create
)
do
|
project
|
create_list
(
:security_scan
,
2
,
project:
project
)
end
end
trait
:with_compliance_framework
do
trait
:with_compliance_framework
do
association
:compliance_framework_setting
,
factory: :compliance_framework_project_setting
association
:compliance_framework_setting
,
factory: :compliance_framework_project_setting
end
end
...
...
ee/spec/finders/group_projects_finder_spec.rb
View file @
f4cc5194
...
@@ -29,14 +29,10 @@ RSpec.describe GroupProjectsFinder do
...
@@ -29,14 +29,10 @@ RSpec.describe GroupProjectsFinder do
end
end
end
end
describe
"group's projects with security
report
s"
do
describe
"group's projects with security
scan
s"
do
let
(
:params
)
{
{
with_security_reports:
true
}
}
let
(
:params
)
{
{
with_security_reports:
true
}
}
let
(
:project_with_reports
)
{
create
(
:project
,
:public
,
group:
group
)
}
let!
(
:project_with_security_scans
)
{
create
(
:project
,
:with_security_scans
,
:public
,
group:
group
)
}
let!
(
:project_without_reports
)
{
create
(
:project
,
:public
,
group:
group
)
}
let!
(
:project_without_security_scans
)
{
create
(
:project
,
:public
,
group:
group
)
}
before
do
create
(
:ee_ci_job_artifact
,
:sast
,
project:
project_with_reports
)
end
context
'when security dashboard is enabled for a group'
do
context
'when security dashboard is enabled for a group'
do
let
(
:group
)
{
create
(
:group_with_plan
,
plan: :ultimate_plan
)
}
# overriding group from 'GroupProjectsFinder context'
let
(
:group
)
{
create
(
:group_with_plan
,
plan: :ultimate_plan
)
}
# overriding group from 'GroupProjectsFinder context'
...
@@ -46,14 +42,14 @@ RSpec.describe GroupProjectsFinder do
...
@@ -46,14 +42,14 @@ RSpec.describe GroupProjectsFinder do
enable_namespace_license_check!
enable_namespace_license_check!
end
end
it
{
is_expected
.
to
contain_exactly
(
project_with_
report
s
)
}
it
{
is_expected
.
to
contain_exactly
(
project_with_
security_scan
s
)
}
end
end
context
'when security dashboard is disabled for a group'
do
context
'when security dashboard is disabled for a group'
do
let
(
:project_with_
report
s
)
{
create
(
:project
,
:public
,
group:
group
)
}
let
(
:project_with_
security_scan
s
)
{
create
(
:project
,
:public
,
group:
group
)
}
# using `include` since other projects may be added to this group from different contexts
# using `include` since other projects may be added to this group from different contexts
it
{
is_expected
.
to
include
(
project_with_
reports
,
project_without_report
s
)
}
it
{
is_expected
.
to
include
(
project_with_
security_scans
,
project_without_security_scan
s
)
}
end
end
end
end
end
end
ee/spec/models/project_spec.rb
View file @
f4cc5194
...
@@ -311,6 +311,18 @@ RSpec.describe Project do
...
@@ -311,6 +311,18 @@ RSpec.describe Project do
end
end
end
end
describe
'.with_security_scans'
do
it
'returns the correct project'
do
project_without_security_scans
=
create
(
:project
)
project_with_security_scans
=
create
(
:project
,
:with_security_scans
)
expect
(
described_class
.
with_security_scans
)
.
to
include
(
project_with_security_scans
)
expect
(
described_class
.
with_security_scans
)
.
not_to
include
(
project_without_security_scans
)
end
end
describe
'.with_github_integration_pipeline_events'
do
describe
'.with_github_integration_pipeline_events'
do
it
'returns the correct project'
do
it
'returns the correct project'
do
project_with_github_integration_pipeline_events
=
create
(
:project
,
github_integration:
create
(
:github_integration
))
project_with_github_integration_pipeline_events
=
create
(
:project
,
github_integration:
create
(
:github_integration
))
...
...
ee/spec/requests/api/groups_spec.rb
View file @
f4cc5194
...
@@ -603,12 +603,8 @@ RSpec.describe API::Groups do
...
@@ -603,12 +603,8 @@ RSpec.describe API::Groups do
describe
"GET /groups/:id/projects"
do
describe
"GET /groups/:id/projects"
do
context
"when authenticated as user"
do
context
"when authenticated as user"
do
let
(
:project_with_reports
)
{
create
(
:project
,
:public
,
group:
group
)
}
let!
(
:project_with_security_scans
)
{
create
(
:project
,
:with_security_scans
,
:public
,
group:
group
)
}
let!
(
:project_without_reports
)
{
create
(
:project
,
:public
,
group:
group
)
}
let!
(
:project_without_security_scans
)
{
create
(
:project
,
:public
,
group:
group
)
}
before
do
create
(
:ee_ci_job_artifact
,
:sast
,
project:
project_with_reports
)
end
subject
{
get
api
(
"/groups/
#{
group
.
id
}
/projects"
,
user
),
params:
{
with_security_reports:
true
}
}
subject
{
get
api
(
"/groups/
#{
group
.
id
}
/projects"
,
user
),
params:
{
with_security_reports:
true
}
}
...
@@ -620,19 +616,19 @@ RSpec.describe API::Groups do
...
@@ -620,19 +616,19 @@ RSpec.describe API::Groups do
enable_namespace_license_check!
enable_namespace_license_check!
end
end
it
"returns only projects with security
report
s"
do
it
"returns only projects with security
scan
s"
do
subject
subject
expect
(
json_response
.
map
{
|
p
|
p
[
'id'
]
}).
to
contain_exactly
(
project_with_
report
s
.
id
)
expect
(
json_response
.
map
{
|
p
|
p
[
'id'
]
}).
to
contain_exactly
(
project_with_
security_scan
s
.
id
)
end
end
end
end
context
'when security dashboard is disabled for a group'
do
context
'when security dashboard is disabled for a group'
do
it
"returns all projects regardless of the security
report
s"
do
it
"returns all projects regardless of the security
scan
s"
do
subject
subject
# using `include` since other projects may be added to this group from different contexts
# using `include` since other projects may be added to this group from different contexts
expect
(
json_response
.
map
{
|
p
|
p
[
'id'
]
}).
to
include
(
project_with_
reports
.
id
,
project_without_report
s
.
id
)
expect
(
json_response
.
map
{
|
p
|
p
[
'id'
]
}).
to
include
(
project_with_
security_scans
.
id
,
project_without_security_scan
s
.
id
)
end
end
end
end
end
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment