rossfuhrman (bb1ee550) at 19 Mar 23:48
Expand Dast::ProfileTag spec coverage and add tag_name callback
rossfuhrman (2f17315a) at 19 Mar 23:01
Queue backfill of tag_name on dast_profiles_tags
@m-omokoh As promised, here are some thoughts. Would love to hear thoughts/feedback on this, and I'm happy to move to an issue if that will make discussion easier.
cc @mfangman @or-gal @nrotaru @gkatz1
Security inventory analyzers only change status based on default branch pipelines Vulnerabilities only show up in the dashboard for default branch pipelines
I wonder if Security inventory and Vulnerability Dashboards tracking default branch pipelines vs. Scan profiles tracking all pipelines will lead to a confusing user experience? I imagine some typical workflows might involve bouncing back and forth between those three areas of the product.
On the Source field - I think showing the scan trigger (Push Protection, MR Pipelines, Branch Pipelines) is meaningful for users.
These are separate surfaces and we shouldn't assume they need to track the same things.
Agreed! And this is why I brought it up. I don't think anything in the current backend proposal accounts for tracking the status of kinds of pipelines that we weren't already tracking for Security inventory. If we need to track MR pipelines in a way that will be represented in the Scan profile view for projects, we will need to re-evaluate the backend approach.
Using gitlab-org/gitlab as an example:
My proposal would be
@nrotaru I think this looks very good, but I did have a few questions/comments for you.
Apologies if I missed the discussion, but am I understanding this table will have a 1:1 relationship with security_scan_profile_projects records?
And if so, did we discuss/consider adding the necessary columns to security_scan_profile_projects, as opposed to creating a new table?
The related security scan_profile has a scan_type. Do we need to duplicate that here?
(question/nitpick, non-blocking) I would expect stale? would only need to consider last_scan_at and not be concerned with not_configured?.
I think a scan can be stale regardless of whether the profile is configured or not.
Either way, if we need to discuss further, this can be tweaked in follow-up MRs.
- security_testing_configurationThere are a lot of changes here that should not be included in this MR.
Fix feature category in the metrics related to Security Scan Profiles
Earlier we identified that scan profiles related components were incorrectly assigned wrong feature category ( #592069 ). This commit assigns the correct feature category to the corresponding metrics.
Fixes: #592069
Discussion: !227536 (comment 3164478674)
We have confirmed with product manager and product analyst.
N/A non functional maintenance change.
N/A non functional maintenance change.
Evaluate this MR against the MR acceptance checklist. It helps you analyze changes to reduce risks in quality, performance, reliability, security, and maintainability.
@eugielimpin @ccharnolevsky things look good from the BE perspective.
Context: Security Managers are allowed to view Security Configuration page but are not allowed to configure Security testing scanners.
This MR updates the Security Configuration (Security testing tab) page to disable buttons that lead to authorization errors when the current user doesn't have the required permissions (e.g. current user is a Security Manager).
| Before | After |
|---|---|
![]() |
![]() |
Start GDK with support for Security Manager role
$ export GITLAB_SECURITY_MANAGER_ROLE=true
$ gdk start
Ensure that your instance has an active EE license
Login with root then navigate to a project
Add another user as a Security Manager
Logout then login with the Security Manager user
Navigate to the project's Secure -> Security configuration page and verify that buttons to enable scanners are disabled
Navigate to the project's parent group's Secure -> Security inventory page, filter for the project, click on the kebab button > Manage security configuration button, and verify that buttons to enable scanners are disabled
Evaluate this MR against the MR acceptance checklist. It helps you analyze changes to reduce risks in quality, performance, reliability, security, and maintainability.
rossfuhrman (3799fcad) at 18 Mar 18:57
rossfuhrman (527a3bf9) at 18 Mar 18:57
Merge branch 'vpedak-fix-assigned-feature-categories' into 'master'
... and 1 more commit
The scan profile related components were incorrectly categorised under the security_asset_inventories feature category, wheres they should be under the security_testing_configuration.
Fix the assigned feature category for scan profile backend components
security_asset_inventories to security_testing_configuration to properly reflect their functionality and purposebundle exec rake gitlab:custom_roles:compile_docs
Fixes: #592069
N/A. It is a maintenance backend change.
N/A. It is a maintenance backend change.
Evaluate this MR against the MR acceptance checklist. It helps you analyze changes to reduce risks in quality, performance, reliability, security, and maintainability.
@vpedak1 LGTM