Commit f5248f6f authored by Dylan Griffith's avatar Dylan Griffith

Merge branch 'revert-bd10bff3' into 'master'

Revert "Merge branch 218012-vulnerabilities-are-incorrectly-marked..."

See merge request gitlab-org/gitlab!38411
parents e7f3637b 5a0953ab
......@@ -142,25 +142,9 @@ class Vulnerability < ApplicationRecord
def resolved_on_default_branch
return false unless findings.any?
project = Project
.includes(ci_pipelines: :builds)
.find(self.project_id)
# We can't just use project.latest_successful_pipeline_for_default_branch
# because there's no guarantee that it actually ran the security jobs
# See https://gitlab.com/gitlab-org/gitlab/-/issues/218012
latest_successful_pipeline = project
.ci_pipelines
.success
.newest_first(ref: project.default_branch, limit: 10)
.find { |pipeline| pipeline.builds.any? { |build| build.name == self.report_type } }
# Technically this shouldn't ever happen.
# If an vulnerability was discovered, then we must have ran a scan of the
# appropriate type at least once.
return false unless latest_successful_pipeline
finding.pipelines.exclude?(latest_successful_pipeline)
latest_successful_pipeline_for_default_branch = project.latest_successful_pipeline_for_default_branch
latest_pipeline_with_vulnerability = finding.pipelines.order(created_at: :desc).first
latest_pipeline_with_vulnerability != latest_successful_pipeline_for_default_branch
end
def user_notes_count
......
---
title: Mark Vulnerabilities as resolved only if the latest pipeline for default branch
ran respective security job
merge_request: 37937
author:
type: fixed
......@@ -267,7 +267,7 @@ RSpec.describe Vulnerability do
describe '#resolved_on_default_branch' do
let_it_be(:project) { create(:project, :repository, :with_vulnerability) }
let_it_be(:pipeline_with_vulnerability) { create(:ci_pipeline, :success, :with_sast_build, project: project, sha: project.commit.id) }
let_it_be(:pipeline_with_vulnerability) { create(:ci_pipeline, :success, project: project, sha: project.commit.id) }
let_it_be(:vulnerability) { project.vulnerabilities.first }
let_it_be(:finding1) { create(:vulnerabilities_occurrence, vulnerability: vulnerability, pipelines: [pipeline_with_vulnerability]) }
let_it_be(:finding2) { create(:vulnerabilities_occurrence, vulnerability: vulnerability, pipelines: [pipeline_with_vulnerability]) }
......@@ -279,7 +279,11 @@ RSpec.describe Vulnerability do
end
context 'Vulnerability::Finding is not present on the pipeline for default branch' do
let_it_be(:pipeline_without_vulnerability) { create(:ci_pipeline, :success, :with_sast_build, project: project, sha: project.commit.id) }
before do
project.instance_variable_set(:@latest_successful_pipeline_for_default_branch, pipeline_without_vulnerability)
end
let_it_be(:pipeline_without_vulnerability) { create(:ci_pipeline, :success, project: project, sha: project.commit.id) }
it { is_expected.to eq(true) }
end
......
......@@ -420,8 +420,6 @@ FactoryBot.define do
end
trait :sast do
name { "sast" }
options do
{
artifacts: { reports: { sast: 'gl-sast-report.json' } }
......
......@@ -130,14 +130,6 @@ FactoryBot.define do
end
end
trait :with_sast_build do
status { :success }
after(:build) do |pipeline, evaluator|
pipeline.builds << build(:ci_build, :sast, pipeline: pipeline, project: pipeline.project)
end
end
trait :with_exposed_artifacts do
status { :success }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment