Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
1d78f6ae
Commit
1d78f6ae
authored
Oct 08, 2019
by
Victor Zagorodny
Committed by
Rémy Coutable
Oct 08, 2019
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Rename Vulnerabilities API to Vulnerability Findings API
parent
fcd59f2d
Changes
7
Hide whitespace changes
Inline
Side-by-side
Showing
7 changed files
with
221 additions
and
54 deletions
+221
-54
ee/app/helpers/ee/projects_helper.rb
ee/app/helpers/ee/projects_helper.rb
+12
-0
ee/app/views/projects/pipelines/_tabs_content.html.haml
ee/app/views/projects/pipelines/_tabs_content.html.haml
+1
-1
ee/lib/api/vulnerability_findings.rb
ee/lib/api/vulnerability_findings.rb
+67
-29
ee/lib/ee/api/api.rb
ee/lib/ee/api/api.rb
+1
-1
ee/spec/helpers/projects_helper_spec.rb
ee/spec/helpers/projects_helper_spec.rb
+31
-7
ee/spec/requests/api/vulnerability_findings_spec.rb
ee/spec/requests/api/vulnerability_findings_spec.rb
+72
-16
ee/spec/views/projects/pipelines/_tabs_content.html.haml_spec.rb
.../views/projects/pipelines/_tabs_content.html.haml_spec.rb
+37
-0
No files found.
ee/app/helpers/ee/projects_helper.rb
View file @
1d78f6ae
...
@@ -235,5 +235,17 @@ module EE
...
@@ -235,5 +235,17 @@ module EE
def
can_import_members?
def
can_import_members?
super
&&
!
membership_locked?
super
&&
!
membership_locked?
end
end
def
api_projects_vulnerability_findings_path
(
project
,
pipeline
)
params
=
{
id:
project
.
id
,
params:
{
pipeline_id:
pipeline
.
id
,
scope:
'dismissed'
}
}
path
=
if
::
Feature
.
enabled?
(
:first_class_vulnerabilities
)
api_v4_projects_vulnerability_findings_path
(
params
)
else
api_v4_projects_vulnerabilities_path
(
params
)
end
expose_path
(
path
)
end
end
end
end
end
ee/app/views/projects/pipelines/_tabs_content.html.haml
View file @
1d78f6ae
...
@@ -16,7 +16,7 @@
...
@@ -16,7 +16,7 @@
empty_state_svg_path:
image_path
(
'illustrations/security-dashboard-empty-state.svg'
),
empty_state_svg_path:
image_path
(
'illustrations/security-dashboard-empty-state.svg'
),
pipeline_id:
pipeline
.
id
,
pipeline_id:
pipeline
.
id
,
project_id:
project
.
id
,
project_id:
project
.
id
,
vulnerabilities_endpoint:
expose_path
(
api_v4_projects_vulnerabilities_path
(
id:
project
.
id
,
params:
{
pipeline_id:
pipeline
.
id
,
scope:
'dismissed'
})
),
vulnerabilities_endpoint:
api_projects_vulnerability_findings_path
(
project
,
pipeline
),
vulnerability_feedback_help_path:
help_page_path
(
'user/application_security/index'
)
}
}
vulnerability_feedback_help_path:
help_page_path
(
'user/application_security/index'
)
}
}
-
else
-
else
#js-security-report-app
{
data:
{
head_blob_path:
blob_path
,
#js-security-report-app
{
data:
{
head_blob_path:
blob_path
,
...
...
ee/lib/api/vulnerabilit
ie
s.rb
→
ee/lib/api/vulnerabilit
y_finding
s.rb
View file @
1d78f6ae
# frozen_string_literal: true
# frozen_string_literal: true
module
API
module
API
class
Vulnerabilit
ie
s
<
Grape
::
API
class
Vulnerabilit
yFinding
s
<
Grape
::
API
include
PaginationParams
include
PaginationParams
helpers
do
helpers
do
params
:vulnerability_findings_params
do
optional
:report_type
,
type:
Array
[
String
],
desc:
'The type of report vulnerability belongs to'
,
values:
::
Vulnerabilities
::
Occurrence
.
report_types
.
keys
,
default:
::
Vulnerabilities
::
Occurrence
.
report_types
.
keys
optional
:scope
,
type:
String
,
desc:
'Return vulnerabilities for the given scope: `dismissed` or `all`'
,
default:
'dismissed'
,
values:
%w[all dismissed]
optional
:severity
,
type:
Array
[
String
],
desc:
'Returns issues belonging to specified severity level: '
\
'`undefined`, `info`, `unknown`, `low`, `medium`, `high`, or `critical`. Defaults to all'
,
values:
::
Vulnerabilities
::
Occurrence
.
severities
.
keys
,
default:
::
Vulnerabilities
::
Occurrence
.
severities
.
keys
optional
:confidence
,
type:
Array
[
String
],
desc:
'Returns vulnerabilities belonging to specified confidence level: '
\
'`undefined`, `ignore`, `unknown`, `experimental`, `low`, `medium`, `high`, or `confirmed`. '
\
'Defaults to all'
,
values:
::
Vulnerabilities
::
Occurrence
.
confidences
.
keys
,
default:
::
Vulnerabilities
::
Occurrence
.
confidences
.
keys
optional
:pipeline_id
,
type:
String
,
desc:
'The ID of the pipeline'
use
:pagination
end
def
vulnerability_occurrences_by
(
params
)
def
vulnerability_occurrences_by
(
params
)
pipeline
=
if
params
[
:pipeline_id
]
pipeline
=
if
params
[
:pipeline_id
]
params
[
:project
].
all_pipelines
.
find_by
(
id:
params
[
:pipeline_id
])
# rubocop:disable CodeReuse/ActiveRecord
params
[
:project
].
all_pipelines
.
find_by
(
id:
params
[
:pipeline_id
])
# rubocop:disable CodeReuse/ActiveRecord
...
@@ -16,6 +40,28 @@ module API
...
@@ -16,6 +40,28 @@ module API
Security
::
PipelineVulnerabilitiesFinder
.
new
(
pipeline:
pipeline
,
params:
params
).
execute
Security
::
PipelineVulnerabilitiesFinder
.
new
(
pipeline:
pipeline
,
params:
params
).
execute
end
end
def
respond_with_vulnerabilities
# TODO: implement the "Get a list of project's Vulnerabilities" step
# of https://gitlab.com/gitlab-org/gitlab-ee/issues/10242#status
not_found!
end
def
respond_with_vulnerability_findings
authorize!
:read_project_security_dashboard
,
user_project
vulnerability_occurrences
=
paginate
(
Kaminari
.
paginate_array
(
vulnerability_occurrences_by
(
declared_params
.
merge
(
project:
user_project
))
)
)
Gitlab
::
Vulnerabilities
::
OccurrencesPreloader
.
preload_feedback!
(
vulnerability_occurrences
)
present
vulnerability_occurrences
,
with:
::
Vulnerabilities
::
OccurrenceEntity
,
request:
GrapeRequestProxy
.
new
(
request
,
current_user
)
end
end
end
before
do
before
do
...
@@ -27,40 +73,32 @@ module API
...
@@ -27,40 +73,32 @@ module API
end
end
resource
:projects
,
requirements:
API
::
NAMESPACE_OR_PROJECT_REQUIREMENTS
do
resource
:projects
,
requirements:
API
::
NAMESPACE_OR_PROJECT_REQUIREMENTS
do
params
do
use
:vulnerability_findings_params
end
desc
'Get a list of project vulnerabilities'
do
desc
'Get a list of project vulnerabilities'
do
success
::
Vulnerabilities
::
OccurrenceEntity
success
::
Vulnerabilities
::
OccurrenceEntity
end
end
get
':id/vulnerabilities'
do
if
Feature
.
enabled?
(
:first_class_vulnerabilities
)
respond_with_vulnerabilities
else
respond_with_vulnerability_findings
end
end
params
do
params
do
optional
:report_type
,
type:
Array
[
String
],
desc:
'The type of report vulnerability belongs to'
,
default:
::
Vulnerabilities
::
Occurrence
.
report_types
.
keys
use
:vulnerability_findings_params
optional
:scope
,
type:
String
,
desc:
'Return vulnerabilities for the given scope: `dismissed` or `all`'
,
default:
'dismissed'
,
values:
%w[all dismissed]
optional
:severity
,
type:
Array
[
String
],
desc:
'Returns issues belonging to specified severity level: `undefined`, `info`, `unknown`, `low`, `medium`, `high`, or `critical`. Defaults to all'
,
default:
::
Vulnerabilities
::
Occurrence
.
severities
.
keys
optional
:confidence
,
type:
Array
[
String
],
desc:
'Returns vulnerabilities belonging to specified confidence level: `undefined`, `ignore`, `unknown`, `experimental`, `low`, `medium`, `high`, or `confirmed`. Defaults to all'
,
default:
::
Vulnerabilities
::
Occurrence
.
confidences
.
keys
optional
:pipeline_id
,
type:
String
,
desc:
'The ID of the pipeline'
use
:pagination
end
end
desc
'Get a list of project vulnerability findings'
do
get
':id/vulnerabilities'
do
success
::
Vulnerabilities
::
OccurrenceEntity
authorize!
:read_project_security_dashboard
,
user_project
end
get
':id/vulnerability_findings'
do
vulnerability_occurrences
=
paginate
(
if
Feature
.
enabled?
(
:first_class_vulnerabilities
)
Kaminari
.
paginate_array
(
respond_with_vulnerability_findings
vulnerability_occurrences_by
(
declared_params
.
merge
(
project:
user_project
))
else
)
not_found!
)
end
Gitlab
::
Vulnerabilities
::
OccurrencesPreloader
.
preload_feedback!
(
vulnerability_occurrences
)
present
vulnerability_occurrences
,
with:
::
Vulnerabilities
::
OccurrenceEntity
,
request:
GrapeRequestProxy
.
new
(
request
,
current_user
)
end
end
end
end
end
end
...
...
ee/lib/ee/api/api.rb
View file @
1d78f6ae
...
@@ -35,7 +35,7 @@ module EE
...
@@ -35,7 +35,7 @@ module EE
mount
::
API
::
Scim
mount
::
API
::
Scim
mount
::
API
::
ManagedLicenses
mount
::
API
::
ManagedLicenses
mount
::
API
::
ProjectApprovals
mount
::
API
::
ProjectApprovals
mount
::
API
::
Vulnerabilit
ie
s
mount
::
API
::
Vulnerabilit
yFinding
s
mount
::
API
::
MergeRequestApprovals
mount
::
API
::
MergeRequestApprovals
mount
::
API
::
MergeRequestApprovalRules
mount
::
API
::
MergeRequestApprovalRules
mount
::
API
::
ProjectAliases
mount
::
API
::
ProjectAliases
...
...
ee/spec/helpers/projects_helper_spec.rb
View file @
1d78f6ae
...
@@ -97,18 +97,24 @@ describe ProjectsHelper do
...
@@ -97,18 +97,24 @@ describe ProjectsHelper do
end
end
end
end
describe
'#project_security_dashboard_config
'
do
shared_context
'project with owner and pipeline
'
do
let
(
:user
)
{
create
(
:user
)
}
let
(
:user
)
{
create
(
:user
)
}
let
(
:group
)
{
create
(
:group
).
tap
{
|
g
|
g
.
add_owner
(
user
)
}
}
let
(
:group
)
{
create
(
:group
).
tap
{
|
g
|
g
.
add_owner
(
user
)
}
}
let
(
:project
)
{
create
(
:project
,
:repository
,
group:
group
)
}
let
(
:pipeline
)
do
let
(
:pipeline
)
do
create
(
:ee_ci_pipeline
,
create
(
:ee_ci_pipeline
,
:with_sast_report
,
:with_sast_report
,
user:
user
,
user:
user
,
project:
project
,
project:
project
,
ref:
project
.
default_branch
,
ref:
project
.
default_branch
,
sha:
project
.
commit
.
sha
)
sha:
project
.
commit
.
sha
)
end
end
let
(
:project
)
{
create
(
:project
,
:repository
,
group:
group
)
}
end
describe
'#project_security_dashboard_config'
do
include_context
'project with owner and pipeline'
let
(
:project
)
{
create
(
:project
,
:repository
,
group:
group
)
}
context
'project without pipeline'
do
context
'project without pipeline'
do
subject
{
helper
.
project_security_dashboard_config
(
project
,
nil
)
}
subject
{
helper
.
project_security_dashboard_config
(
project
,
nil
)
}
...
@@ -128,4 +134,22 @@ describe ProjectsHelper do
...
@@ -128,4 +134,22 @@ describe ProjectsHelper do
end
end
end
end
end
end
describe
'#api_projects_vulnerability_findings_path'
do
include_context
'project with owner and pipeline'
subject
{
helper
.
api_projects_vulnerability_findings_path
(
project
,
pipeline
)
}
context
'when Vulnerability Findings API enabled'
do
it
{
is_expected
.
to
include
(
"projects/
#{
project
.
id
}
/vulnerability_findings"
)
}
end
context
'when the Vulnerability Findings API is disabled'
do
before
do
stub_feature_flags
(
first_class_vulnerabilities:
false
)
end
it
{
is_expected
.
to
include
(
"projects/
#{
project
.
id
}
/vulnerabilities"
)
}
end
end
end
end
ee/spec/requests/api/vulnerabilit
ie
s_spec.rb
→
ee/spec/requests/api/vulnerabilit
y_finding
s_spec.rb
View file @
1d78f6ae
...
@@ -2,7 +2,7 @@
...
@@ -2,7 +2,7 @@
require
'spec_helper'
require
'spec_helper'
describe
API
::
Vulnerabilit
ie
s
do
describe
API
::
Vulnerabilit
yFinding
s
do
set
(
:project
)
{
create
(
:project
,
:public
)
}
set
(
:project
)
{
create
(
:project
,
:public
)
}
set
(
:user
)
{
create
(
:user
)
}
set
(
:user
)
{
create
(
:user
)
}
...
@@ -32,7 +32,9 @@ describe API::Vulnerabilities do
...
@@ -32,7 +32,9 @@ describe API::Vulnerabilities do
dismissal
dismissal
end
end
describe
"GET /projects/:id/vulnerabilities"
do
shared_examples
'getting list of vulnerability findings'
do
let
(
:project_vulnerabilities_path
)
{
"/projects/
#{
project
.
id
}
/
#{
api_resource_name
}
"
}
context
'with an authorized user with proper permissions'
do
context
'with an authorized user with proper permissions'
do
before
do
before
do
project
.
add_developer
(
user
)
project
.
add_developer
(
user
)
...
@@ -41,7 +43,7 @@ describe API::Vulnerabilities do
...
@@ -41,7 +43,7 @@ describe API::Vulnerabilities do
it
'returns all non-dismissed vulnerabilities'
do
it
'returns all non-dismissed vulnerabilities'
do
occurrence_count
=
(
sast_report
.
occurrences
.
count
+
ds_report
.
occurrences
.
count
-
1
).
to_s
occurrence_count
=
(
sast_report
.
occurrences
.
count
+
ds_report
.
occurrences
.
count
-
1
).
to_s
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities?per_page=40"
,
user
)
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
per_page:
40
}
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
response
).
to
include_pagination_headers
expect
(
response
).
to
include_pagination_headers
...
@@ -54,17 +56,17 @@ describe API::Vulnerabilities do
...
@@ -54,17 +56,17 @@ describe API::Vulnerabilities do
it
'does not have N+1 queries'
do
it
'does not have N+1 queries'
do
control_count
=
ActiveRecord
::
QueryRecorder
.
new
do
control_count
=
ActiveRecord
::
QueryRecorder
.
new
do
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
),
params:
{
report_type:
'dependency_scanning'
}
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
report_type:
'dependency_scanning'
}
end
.
count
end
.
count
expect
{
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
)
}.
not_to
exceed_query_limit
(
control_count
)
expect
{
get
api
(
project_vulnerabilities_path
,
user
)
}.
not_to
exceed_query_limit
(
control_count
)
end
end
describe
'filtering'
do
describe
'filtering'
do
it
'returns vulnerabilities with sast report_type'
do
it
'returns vulnerabilities with sast report_type'
do
occurrence_count
=
(
sast_report
.
occurrences
.
count
-
1
).
to_s
occurrence_count
=
(
sast_report
.
occurrences
.
count
-
1
).
to_s
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
),
params:
{
report_type:
'sast'
}
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
report_type:
'sast'
}
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
response
).
to
have_gitlab_http_status
(
200
)
...
@@ -80,7 +82,7 @@ describe API::Vulnerabilities do
...
@@ -80,7 +82,7 @@ describe API::Vulnerabilities do
it
'returns vulnerabilities with dependency_scanning report_type'
do
it
'returns vulnerabilities with dependency_scanning report_type'
do
occurrence_count
=
ds_report
.
occurrences
.
count
.
to_s
occurrence_count
=
ds_report
.
occurrences
.
count
.
to_s
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
),
params:
{
report_type:
'dependency_scanning'
}
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
report_type:
'dependency_scanning'
}
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
response
).
to
have_gitlab_http_status
(
200
)
...
@@ -93,10 +95,16 @@ describe API::Vulnerabilities do
...
@@ -93,10 +95,16 @@ describe API::Vulnerabilities do
expect
(
json_response
.
first
[
'name'
]).
to
eq
'ruby-ffi DDL loading issue on Windows OS'
expect
(
json_response
.
first
[
'name'
]).
to
eq
'ruby-ffi DDL loading issue on Windows OS'
end
end
it
'returns a "bad request" response for an unknown report type'
do
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
report_type:
'blah'
}
expect
(
response
).
to
have_gitlab_http_status
(
400
)
end
it
'returns dismissed vulnerabilities with `all` scope'
do
it
'returns dismissed vulnerabilities with `all` scope'
do
occurrence_count
=
(
sast_report
.
occurrences
.
count
+
ds_report
.
occurrences
.
count
).
to_s
occurrence_count
=
(
sast_report
.
occurrences
.
count
+
ds_report
.
occurrences
.
count
).
to_s
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
),
params:
{
per_page:
40
,
scope:
'all'
}
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
per_page:
40
,
scope:
'all'
}
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
response
).
to
have_gitlab_http_status
(
200
)
...
@@ -104,26 +112,38 @@ describe API::Vulnerabilities do
...
@@ -104,26 +112,38 @@ describe API::Vulnerabilities do
end
end
it
'returns vulnerabilities with low severity'
do
it
'returns vulnerabilities with low severity'
do
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
),
params:
{
per_page:
40
,
severity:
'low'
}
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
per_page:
40
,
severity:
'low'
}
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
json_response
.
map
{
|
v
|
v
[
'severity'
]
}.
uniq
).
to
eq
%w[low]
expect
(
json_response
.
map
{
|
v
|
v
[
'severity'
]
}.
uniq
).
to
eq
%w[low]
end
end
it
'returns a "bad request" response for an unknown severity value'
do
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
severity:
'foo'
}
expect
(
response
).
to
have_gitlab_http_status
(
400
)
end
it
'returns vulnerabilities with high confidence'
do
it
'returns vulnerabilities with high confidence'
do
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
),
params:
{
per_page:
40
,
confidence:
'high'
}
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
per_page:
40
,
confidence:
'high'
}
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
json_response
.
map
{
|
v
|
v
[
'confidence'
]
}.
uniq
).
to
eq
%w[high]
expect
(
json_response
.
map
{
|
v
|
v
[
'confidence'
]
}.
uniq
).
to
eq
%w[high]
end
end
it
'returns a "bad request" response for an unknown confidence value'
do
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
confidence:
'qux'
}
expect
(
response
).
to
have_gitlab_http_status
(
400
)
end
context
'when pipeline_id is supplied'
do
context
'when pipeline_id is supplied'
do
it
'returns vulnerabilities from supplied pipeline'
do
it
'returns vulnerabilities from supplied pipeline'
do
occurrence_count
=
(
sast_report
.
occurrences
.
count
+
ds_report
.
occurrences
.
count
-
1
).
to_s
occurrence_count
=
(
sast_report
.
occurrences
.
count
+
ds_report
.
occurrences
.
count
-
1
).
to_s
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
),
params:
{
per_page:
40
,
pipeline_id:
pipeline
.
id
}
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
per_page:
40
,
pipeline_id:
pipeline
.
id
}
expect
(
response
).
to
have_gitlab_http_status
(
200
)
expect
(
response
).
to
have_gitlab_http_status
(
200
)
...
@@ -132,7 +152,7 @@ describe API::Vulnerabilities do
...
@@ -132,7 +152,7 @@ describe API::Vulnerabilities do
context
'pipeline has no reports'
do
context
'pipeline has no reports'
do
it
'returns empty results'
do
it
'returns empty results'
do
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
),
params:
{
per_page:
40
,
pipeline_id:
pipeline_without_vulnerabilities
.
id
}
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
per_page:
40
,
pipeline_id:
pipeline_without_vulnerabilities
.
id
}
expect
(
json_response
).
to
eq
[]
expect
(
json_response
).
to
eq
[]
end
end
...
@@ -140,7 +160,7 @@ describe API::Vulnerabilities do
...
@@ -140,7 +160,7 @@ describe API::Vulnerabilities do
context
'with unknown pipeline'
do
context
'with unknown pipeline'
do
it
'returns empty results'
do
it
'returns empty results'
do
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
),
params:
{
per_page:
40
,
pipeline_id:
0
}
get
api
(
project_vulnerabilities_path
,
user
),
params:
{
per_page:
40
,
pipeline_id:
0
}
expect
(
json_response
).
to
eq
[]
expect
(
json_response
).
to
eq
[]
end
end
...
@@ -156,7 +176,7 @@ describe API::Vulnerabilities do
...
@@ -156,7 +176,7 @@ describe API::Vulnerabilities do
end
end
it
'responds with 403 Forbidden'
do
it
'responds with 403 Forbidden'
do
get
api
(
"/projects/
#{
project
.
id
}
/vulnerabilities"
,
user
)
get
api
(
project_vulnerabilities_path
,
user
)
expect
(
response
).
to
have_gitlab_http_status
(
403
)
expect
(
response
).
to
have_gitlab_http_status
(
403
)
end
end
...
@@ -166,7 +186,7 @@ describe API::Vulnerabilities do
...
@@ -166,7 +186,7 @@ describe API::Vulnerabilities do
it
'responds with 404 Not Found'
do
it
'responds with 404 Not Found'
do
private_project
=
create
(
:project
)
private_project
=
create
(
:project
)
get
api
(
"/projects/
#{
private_project
.
id
}
/
vulnerabilities
"
,
user
)
get
api
(
"/projects/
#{
private_project
.
id
}
/
#{
api_resource_name
}
"
,
user
)
expect
(
response
).
to
have_gitlab_http_status
(
404
)
expect
(
response
).
to
have_gitlab_http_status
(
404
)
end
end
...
@@ -174,10 +194,46 @@ describe API::Vulnerabilities do
...
@@ -174,10 +194,46 @@ describe API::Vulnerabilities do
context
'with unknown project'
do
context
'with unknown project'
do
it
'responds with 404 Not Found'
do
it
'responds with 404 Not Found'
do
get
api
(
"/projects/0/
vulnerabilities
"
,
user
)
get
api
(
"/projects/0/
#{
api_resource_name
}
"
,
user
)
expect
(
response
).
to
have_gitlab_http_status
(
404
)
expect
(
response
).
to
have_gitlab_http_status
(
404
)
end
end
end
end
end
end
shared_examples
'not found vulnerabilities endpoint'
do
it
do
get
api
(
"/projects/
#{
project
.
id
}
/
#{
api_resource_name
}
?"
,
user
),
params:
{
per_page:
40
}
expect
(
response
).
to
have_gitlab_http_status
(
404
)
end
end
describe
"GET /projects/:id/vulnerabilities"
do
let
(
:api_resource_name
)
{
'vulnerabilities'
}
it_behaves_like
'not found vulnerabilities endpoint'
context
'when vulnerability findings API is disabled'
do
before
do
stub_feature_flags
(
first_class_vulnerabilities:
false
)
end
it_behaves_like
'getting list of vulnerability findings'
end
end
describe
"GET /projects/:id/vulnerability_findings"
do
let
(
:api_resource_name
)
{
'vulnerability_findings'
}
it_behaves_like
'getting list of vulnerability findings'
context
'when vulnerability findings API is disabled'
do
before
do
stub_feature_flags
(
first_class_vulnerabilities:
false
)
end
it_behaves_like
'not found vulnerabilities endpoint'
end
end
end
end
ee/spec/views/projects/pipelines/_tabs_content.html.haml_spec.rb
0 → 100644
View file @
1d78f6ae
# frozen_string_literal: true
require
'spec_helper'
describe
'projects/pipelines/_tabs_content'
do
set
(
:user
)
{
create
(
:user
)
}
let
(
:pipeline
)
{
create
(
:ci_pipeline
).
present
(
current_user:
user
)
}
let
(
:locals
)
{
{
pipeline:
pipeline
,
project:
pipeline
.
project
}
}
before
do
allow
(
pipeline
).
to
receive
(
:expose_security_dashboard?
).
and_return
(
true
)
end
shared_examples
'rendering the appropriate API endpoint path'
do
it
do
render
partial:
'projects/pipelines/tabs_content'
,
locals:
locals
expect
(
rendered
).
to
include
expected_api_path
end
end
context
'when Vulnerability Findings API enabled'
do
it_behaves_like
'rendering the appropriate API endpoint path'
do
let
(
:expected_api_path
)
{
"projects/
#{
pipeline
.
project_id
}
/vulnerability_findings"
}
end
end
context
'when the Vulnerability Findings API is disabled'
do
before
do
stub_feature_flags
(
first_class_vulnerabilities:
false
)
end
it_behaves_like
'rendering the appropriate API endpoint path'
do
let
(
:expected_api_path
)
{
"projects/
#{
pipeline
.
project_id
}
/vulnerabilities"
}
end
end
end
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment