Commit 234a71a4 authored by Manoj M J's avatar Manoj M J Committed by Zamir Martins

Apply suggestions from reviewer

parent 98963d3a
......@@ -180,7 +180,7 @@ RSpec.describe Security::OrchestrationPolicyConfiguration do
end
context 'with scan result policies' do
let(:scan_result_policy) { build(:scan_result_policy, name: 'Containe security critical severities') }
let(:scan_result_policy) { build(:scan_result_policy, name: 'Contains security critical severities') }
let(:policy_yaml) { build(:orchestration_policy_yaml, scan_result_policy: [scan_result_policy]) }
it { is_expected.to eq(true) }
......@@ -201,7 +201,7 @@ RSpec.describe Security::OrchestrationPolicyConfiguration do
with_them do
let(:action) { { type: 'require_approval', approvals_required: 1, user_approvers: user_approvers, user_approvers_ids: user_approvers_ids, group_approvers: group_approvers, group_approvers_ids: group_approvers_ids }.compact }
let(:scan_result_policy) { build(:scan_result_policy, name: 'Containe security critical severities', actions: [action]) }
let(:scan_result_policy) { build(:scan_result_policy, name: 'Contains security critical severities', actions: [action]) }
it { is_expected.to eq(is_valid) }
end
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment