Commit b5fd7238 authored by Dmytro Zaporozhets (DZ)'s avatar Dmytro Zaporozhets (DZ)

Merge branch 'revert-13d059fa' into 'master'

Revert "Merge branch '247490-vuln-blocked-pipeline-in-security-dashboard' into 'master'"

See merge request gitlab-org/gitlab!58604
parents e2b12946 ea44183c
...@@ -43,14 +43,6 @@ module Ci ...@@ -43,14 +43,6 @@ module Ci
def completed_statuses def completed_statuses
COMPLETED_STATUSES.map(&:to_sym) COMPLETED_STATUSES.map(&:to_sym)
end end
def blocked_statuses
BLOCKED_STATUS.map(&:to_sym)
end
def completed_and_blocked_statuses
completed_statuses + blocked_statuses
end
end end
included do included do
......
...@@ -54,7 +54,7 @@ module EE ...@@ -54,7 +54,7 @@ module EE
}.freeze }.freeze
state_machine :status do state_machine :status do
after_transition any => ::Ci::Pipeline.completed_and_blocked_statuses do |pipeline| after_transition any => ::Ci::Pipeline.completed_statuses do |pipeline|
next unless pipeline.can_store_security_reports? next unless pipeline.can_store_security_reports?
pipeline.run_after_commit do pipeline.run_after_commit do
......
---
title: Extend state transition that initiate creation of vulnerabilities in database
to blocked pipeline state
merge_request: 56779
author:
type: added
...@@ -168,6 +168,7 @@ RSpec.describe Ci::Pipeline do ...@@ -168,6 +168,7 @@ RSpec.describe Ci::Pipeline do
end end
end end
describe 'Store security reports worker' do
shared_examples_for 'storing the security reports' do |transition| shared_examples_for 'storing the security reports' do |transition|
let(:default_branch) { pipeline.ref } let(:default_branch) { pipeline.ref }
...@@ -175,8 +176,6 @@ RSpec.describe Ci::Pipeline do ...@@ -175,8 +176,6 @@ RSpec.describe Ci::Pipeline do
before do before do
allow(StoreSecurityReportsWorker).to receive(:perform_async) allow(StoreSecurityReportsWorker).to receive(:perform_async)
allow(::Security::StoreScansWorker).to receive(:perform_async)
allow(SyncSecurityReportsToReportApprovalRulesWorker).to receive(:perform_async)
allow(project).to receive(:default_branch).and_return(default_branch) allow(project).to receive(:default_branch).and_return(default_branch)
allow(pipeline).to receive(:can_store_security_reports?).and_return(can_store_security_reports) allow(pipeline).to receive(:can_store_security_reports?).and_return(can_store_security_reports)
end end
...@@ -185,12 +184,10 @@ RSpec.describe Ci::Pipeline do ...@@ -185,12 +184,10 @@ RSpec.describe Ci::Pipeline do
let(:can_store_security_reports) { true } let(:can_store_security_reports) { true }
context 'when the ref is the default branch of project' do context 'when the ref is the default branch of project' do
it 'schedules relevant workers', :aggregate_failures do it 'schedules store security report worker' do
transition_pipeline transition_pipeline
expect(StoreSecurityReportsWorker).to have_received(:perform_async).with(pipeline.id) expect(StoreSecurityReportsWorker).to have_received(:perform_async).with(pipeline.id)
expect(::Security::StoreScansWorker).to have_received(:perform_async).with(pipeline.id)
expect(SyncSecurityReportsToReportApprovalRulesWorker).to have_received(:perform_async).with(pipeline.id)
end end
end end
...@@ -208,13 +205,11 @@ RSpec.describe Ci::Pipeline do ...@@ -208,13 +205,11 @@ RSpec.describe Ci::Pipeline do
context 'when the security reports can not be stored for the pipeline' do context 'when the security reports can not be stored for the pipeline' do
let(:can_store_security_reports) { false } let(:can_store_security_reports) { false }
context 'when the ref is the default branch of project', :aggregate_failures do context 'when the ref is the default branch of project' do
it 'does not relevant workers' do it 'does not schedule store security report worker' do
transition_pipeline transition_pipeline
expect(StoreSecurityReportsWorker).not_to have_received(:perform_async) expect(StoreSecurityReportsWorker).not_to have_received(:perform_async)
expect(::Security::StoreScansWorker).not_to have_received(:perform_async)
expect(SyncSecurityReportsToReportApprovalRulesWorker).not_to have_received(:perform_async)
end end
end end
...@@ -230,7 +225,6 @@ RSpec.describe Ci::Pipeline do ...@@ -230,7 +225,6 @@ RSpec.describe Ci::Pipeline do
end end
end end
describe 'schedules security report related workers' do
context 'when pipeline is succeeded' do context 'when pipeline is succeeded' do
it_behaves_like 'storing the security reports', :succeed it_behaves_like 'storing the security reports', :succeed
end end
...@@ -246,10 +240,6 @@ RSpec.describe Ci::Pipeline do ...@@ -246,10 +240,6 @@ RSpec.describe Ci::Pipeline do
context 'when pipeline is canceled' do context 'when pipeline is canceled' do
it_behaves_like 'storing the security reports', :cancel it_behaves_like 'storing the security reports', :cancel
end end
context 'when pipeline is blocked' do
it_behaves_like 'storing the security reports', :block
end
end end
describe '#license_scanning_reports' do describe '#license_scanning_reports' do
......
...@@ -197,12 +197,6 @@ RSpec.describe Ci::HasStatus do ...@@ -197,12 +197,6 @@ RSpec.describe Ci::HasStatus do
end end
end end
describe '.completed_and_blocked_statuses' do
subject { Ci::Pipeline.completed_and_blocked_statuses }
it { is_expected.to eq [:success, :failed, :canceled, :skipped, :manual, :scheduled] }
end
context 'for scope with one status' do context 'for scope with one status' do
shared_examples 'having a job' do |status| shared_examples 'having a job' do |status|
%i[ci_build generic_commit_status].each do |type| %i[ci_build generic_commit_status].each do |type|
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment