[SPIKE] Investigate rule limit for policies

Everyone can contribute. Help move this issue forward while earning points, leveling up and collecting rewards.

Why are we doing this work

I'm not seeing a limit in the number of conditions you can stack. Is that an issue? For example, I could have 10 trigger conditions, then like 10 scheduled conditions on top. This seems like something investigate further and ensure users aren't able to cause issue. YAML validation may later fail this but even in current SEPs I can get to the MR step. I don't see this as blocking here as this is existing behavior. I think it would be worth a follow-up investigation however.

Relevant links

Non-functional requirements

  • Documentation:
  • Feature flag:
  • Performance:
  • Testing:

Implementation plan

  • backend investigate implications of many conditions for scan execution policies
  • backend investigate implications of many conditions for pipeline execution policies

Verification steps

Edited by 🤖 GitLab Bot 🤖