Skip to content
GitLab
Next
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • GitLab GitLab
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • Issues 44,761
    • Issues 44,761
    • List
    • Boards
    • Service Desk
    • Milestones
    • Iterations
    • Requirements
  • Merge requests 1,329
    • Merge requests 1,329
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
    • Test Cases
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Packages and registries
    • Packages and registries
    • Package Registry
    • Container Registry
    • Infrastructure Registry
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Code review
    • Insights
    • Issue
    • Repository
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • GitLab.orgGitLab.org
  • GitLabGitLab
  • Issues
  • #346843
Closed
Open
Issue created Nov 30, 2021 by Nicole Schwartz@NicoleSchwartzContributor0 of 6 checklist items completed0/6 checklist items

Allow security reports to be read for pipelines with a Blocked/Incomplete state

Release notes

Problem to solve

Currently security reports are not read when pipelines are in a Blocked/Incomplete state. This can happen due to several reasons:

  1. A job fails and is configured with allow_failure: false
  2. A pipeline has a manual job where the manual job is required to complete for the entire pipeline to be considered as complete
Pipeline Status Pipeline Completion Vulnerability Report Dependency List
Success Complete ✅ ✅
Failed Complete ✅ Will be addressed in &7886
Blocked Incomplete ❌ ❌

Important considerations

Potentially, if we do allow vulnerabilities and dependencies to be read even when the pipeline is in a Blocked/Incomplete state, this could complicate our Security Approvals feature. Prior to implementing this, we need to verify whether it might be possible for a developer to work around the approval by having one of the jobs fail in a way that prevented the security scans from running. If they are then able to merge in their code without security approval, this would then be a breach of the established security approval rule.

As part of this feature, we may need to analyze the project settings for any MRs that have pipelines in a Blocked/Incomplete state. If they have at least one Security Approval policy configured, then we may need to gate the MR on that policy regardless of whether or not vulnerabilities were discovered. This gets to be a complicated scenario to explain, so we will need to design some good in-product messaging to make it clear why the security approval is required even though vulnerabilities may not have been found.

Additionally, it is possible that scan results will change once the pipeline later completes, especially if it is blocked on a manual job. We will need to design carefully for how changing security results will be displayed and communicated in the UI during this time.

Intended users

User experience goal

Proposal

The specific proposal to address this problem has not yet been designed.

Further details

Permissions and Security

Documentation

Availability & Testing

Available Tier

GitLab Ultimate

What does success look like, and how can we measure that?

Is this a cross-stage feature?

Yes, this impacts both the Dependency List for groupcomposition analysis and the Vulnerability Report for groupthreat insights

Links / references

Related issues:

  • #27095
  • #27990

This page may contain information related to upcoming products, features and functionality. It is important to note that the information presented is for informational purposes only, so please do not rely on the information for purchasing or planning purposes. Just like with all projects, the items mentioned on the page are subject to change or delay, and the development, release, and timing of any products, features, or functionality remain at the sole discretion of GitLab Inc.

Edited May 17, 2022 by Sam White
Assignee
Assign to
Time tracking