Commit 3948b981 authored by Lucas Charles's avatar Lucas Charles

docs: Fix vuln location description headings

Previously, different location types
were incorrectly nested under details.
These should be location types
parent cea3caef
...@@ -444,6 +444,10 @@ the system saves only the first 20 of them. Note that vulnerabilities in the [Pi ...@@ -444,6 +444,10 @@ the system saves only the first 20 of them. Note that vulnerabilities in the [Pi
Security](../../user/application_security/security_dashboard/#pipeline-security) Security](../../user/application_security/security_dashboard/#pipeline-security)
tab do not enforce this limit and all identifiers present in the report artifact are displayed. tab do not enforce this limit and all identifiers present in the report artifact are displayed.
### Details
The `details` field is an object that supports many different content elements that are displayed when viewing vulnerability information. An example of the various data elements can be seen in the [security-reports repository](https://gitlab.com/gitlab-examples/security/security-reports/-/tree/master/samples/details-example).
### Location ### Location
The `location` indicates where the vulnerability has been detected. The `location` indicates where the vulnerability has been detected.
...@@ -454,10 +458,6 @@ which is used to track vulnerabilities ...@@ -454,10 +458,6 @@ which is used to track vulnerabilities
as new commits are pushed to the repository. as new commits are pushed to the repository.
The attributes used to generate the location fingerprint also depend on the type of scanning. The attributes used to generate the location fingerprint also depend on the type of scanning.
### Details
The `details` field is an object that supports many different content elements that are displayed when viewing vulnerability information. An example of the various data elements can be seen in the [security-reports repository](https://gitlab.com/gitlab-examples/security/security-reports/-/tree/master/samples/details-example).
#### Dependency Scanning #### Dependency Scanning
The `location` of a Dependency Scanning vulnerability is composed of a `dependency` and a `file`. The `location` of a Dependency Scanning vulnerability is composed of a `dependency` and a `file`.
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment