aboutsummaryrefslogtreecommitdiff
path: root/cvss/v2key_test.go
diff options
context:
space:
mode:
authorPaul Duncan <pabs@pablotron.org>2022-02-04 00:35:31 -0500
committerPaul Duncan <pabs@pablotron.org>2022-02-04 00:35:31 -0500
commit9c17b97cd0f83be3fff9fa4e87fd1d29052ea616 (patch)
tree0d97030a0d0c3ad983be281ce89f80571338887f /cvss/v2key_test.go
parent92400d731546557d110c9c3cc3906d700f83dda8 (diff)
downloadcvez-9c17b97cd0f83be3fff9fa4e87fd1d29052ea616.tar.bz2
cvez-9c17b97cd0f83be3fff9fa4e87fd1d29052ea616.zip
rename to github.com/pablotron/cvez, remove internal libs
Diffstat (limited to 'cvss/v2key_test.go')
-rw-r--r--cvss/v2key_test.go116
1 files changed, 116 insertions, 0 deletions
diff --git a/cvss/v2key_test.go b/cvss/v2key_test.go
new file mode 100644
index 0000000..a54f4e7
--- /dev/null
+++ b/cvss/v2key_test.go
@@ -0,0 +1,116 @@
+package cvss
+
+import "testing"
+
+func TestV2KeyString(t *testing.T) {
+ tests := []struct {
+ key v2Key
+ exp string
+ } {
+ { v2AccessVector, "AV" },
+ { v2AccessComplexity, "AC" },
+ { v2Authentication, "Au" },
+ { v2ConfidentialityImpact, "C" },
+ { v2IntegrityImpact, "I" },
+ { v2AvailabilityImpact, "A" },
+ { v2Exploitability, "E" },
+ { v2RemediationLevel, "RL" },
+ { v2ReportConfidence, "RC" },
+ { v2CollateralDamagePotential, "CDP" },
+ { v2TargetDistribution, "TD" },
+ { v2ConfidentialityRequirement, "CR" },
+ { v2IntegrityRequirement, "IR" },
+ { v2AvailabilityRequirement, "AR" },
+
+ { v2Key(255), "v2Key(255)" },
+ }
+
+ for _, test := range(tests) {
+ t.Run(test.exp, func(t *testing.T) {
+ got := test.key.String()
+ if got != test.exp {
+ t.Errorf("got: \"%s\", exp: \"%s\"", got, test.exp)
+ }
+ })
+ }
+}
+
+func TestV2KeyName(t *testing.T) {
+ tests := []struct {
+ key v2Key
+ exp string
+ } {
+ { v2AccessVector, "Access Vector" },
+ { v2AccessComplexity, "Access Complexity" },
+ { v2Authentication, "Authentication" },
+ { v2ConfidentialityImpact, "Confidentiality Impact" },
+ { v2IntegrityImpact, "Integrity Impact" },
+ { v2AvailabilityImpact, "Availability Impact" },
+ { v2Exploitability, "Exploitability" },
+ { v2RemediationLevel, "Remediation Level" },
+ { v2ReportConfidence, "Report Confidence" },
+ { v2CollateralDamagePotential, "Collateral Damage Potential" },
+ { v2TargetDistribution, "Target Distribution" },
+ { v2ConfidentialityRequirement, "Confidentiality Requirement" },
+ { v2IntegrityRequirement, "Integrity Requirement" },
+ { v2AvailabilityRequirement, "Availability Requirement" },
+ }
+
+ for _, test := range(tests) {
+ t.Run(test.exp, func(t *testing.T) {
+ got := test.key.Name()
+ if got != test.exp {
+ t.Errorf("got: \"%s\", exp: \"%s\"", got, test.exp)
+ }
+ })
+ }
+}
+
+func TestV2KeyCategory(t *testing.T) {
+ tests := []struct {
+ key v2Key
+ exp Category
+ } {
+ { v2AccessVector, Base },
+ { v2AccessComplexity, Base },
+ { v2Authentication, Base },
+ { v2ConfidentialityImpact, Base },
+ { v2IntegrityImpact, Base },
+ { v2AvailabilityImpact, Base },
+ { v2Exploitability, Temporal },
+ { v2RemediationLevel, Temporal },
+ { v2ReportConfidence, Temporal },
+ { v2CollateralDamagePotential, Environmental },
+ { v2TargetDistribution, Environmental},
+ { v2ConfidentialityRequirement, Environmental},
+ { v2IntegrityRequirement, Environmental},
+ { v2AvailabilityRequirement, Environmental},
+ }
+
+ for _, test := range(tests) {
+ t.Run(test.key.String(), func(t *testing.T) {
+ got := test.key.Category()
+ if got != test.exp {
+ t.Errorf("got: \"%s\", exp: \"%s\"", got, test.exp)
+ }
+ })
+ }
+}
+
+func TestInvalidV2KeyName(t *testing.T) {
+ exp := "invalid"
+ got := v2Key(255).Name()
+
+ if got != exp {
+ t.Errorf("got: \"%s\", exp: \"%s\"", got, exp)
+ }
+}
+
+func TestInvalidV2KeyCategory(t *testing.T) {
+ exp := InvalidCategory
+ got := v2Key(255).Category()
+
+ if got != exp {
+ t.Errorf("got: \"%s\", exp: \"%s\"", got, exp)
+ }
+}