Skip to content
Snippets Groups Projects
Verified Commit f403d3c2 authored by Marcos Rocha's avatar Marcos Rocha Committed by GitLab
Browse files

Merge branch '503455-update-vr-mr-disclaimer-text-to-fix-from-patch' into 'master'

Update VR MR disclaimer text to `Fix' from `Patch`

See merge request !173865



Merged-by: default avatarMarcos Rocha <mrocha@gitlab.com>
Approved-by: default avatarMarcos Rocha <mrocha@gitlab.com>
Co-authored-by: default avatarMichael Becker <mbecker@gitlab.com>
parents e23e89b0 682ca328
No related branches found
No related tags found
1 merge request!173865Update VR MR disclaimer text to `Fix' from `Patch`
Pipeline #1561705734 passed
Pipeline: E2E Omnibus GitLab EE

#1561711209

    Pipeline: E2E CNG

    #1561711191

      Pipeline: E2E GDK

      #1561708366

        +30
        ......@@ -5,7 +5,7 @@ Vulnerability finding detected in merge request: <%= merge_request_url(descripti
        MR created from vulnerability: [<%= vulnerability.title %>](<%= vulnerability_url(vulnerability) %>)
        <% end %>
        ## AI GENERATED PATCH
        ## AI GENERATED FIX
        The suggested code changes were generated by GitLab Duo Vulnerability Resolution, an AI feature. **Use this feature with caution.** Before you run a pipeline or apply the code changes, carefully review and test them, to ensure that they solve the vulnerability.
        The large language model that generated the suggested code changes was provided with the entire file that contains the vulnerable lines of code. It is not aware of any functionality outside of this context.
        ......
        ......@@ -341,7 +341,7 @@
        <<~DESC.chomp
        MR created from vulnerability: [#{vulnerability.title}](#{vulnerability_url(vulnerability)})
        ## AI GENERATED PATCH
        ## AI GENERATED FIX
        The suggested code changes were generated by GitLab Duo Vulnerability Resolution, an AI feature. **Use this feature with caution.** Before you run a pipeline or apply the code changes, carefully review and test them, to ensure that they solve the vulnerability.
        The large language model that generated the suggested code changes was provided with the entire file that contains the vulnerable lines of code. It is not aware of any functionality outside of this context.
        ......
        ......@@ -86,7 +86,7 @@ module QA
        expect(page).to have_link('Pipelines')
        expect(page).to have_link('Changes')
        expect(page).to have_content("Resolve vulnerability: #{vuln_name}")
        expect(page).to have_content("AI GENERATED PATCH")
        expect(page).to have_content("AI GENERATED FIX")
        expect(page).to have_content("Description")
        expect(page).to have_content("Summary")
        end
        ......
        0% Loading or .
        You are about to add 0 people to the discussion. Proceed with caution.
        Finish editing this message first!
        Please register or to comment