diff options
author | Paul Duncan <pabs@pablotron.org> | 2022-02-04 00:35:31 -0500 |
---|---|---|
committer | Paul Duncan <pabs@pablotron.org> | 2022-02-04 00:35:31 -0500 |
commit | 9c17b97cd0f83be3fff9fa4e87fd1d29052ea616 (patch) | |
tree | 0d97030a0d0c3ad983be281ce89f80571338887f /internal/cvss/v2key_test.go | |
parent | 92400d731546557d110c9c3cc3906d700f83dda8 (diff) | |
download | cvez-9c17b97cd0f83be3fff9fa4e87fd1d29052ea616.tar.bz2 cvez-9c17b97cd0f83be3fff9fa4e87fd1d29052ea616.zip |
rename to github.com/pablotron/cvez, remove internal libs
Diffstat (limited to 'internal/cvss/v2key_test.go')
-rw-r--r-- | internal/cvss/v2key_test.go | 116 |
1 files changed, 0 insertions, 116 deletions
diff --git a/internal/cvss/v2key_test.go b/internal/cvss/v2key_test.go deleted file mode 100644 index a54f4e7..0000000 --- a/internal/cvss/v2key_test.go +++ /dev/null @@ -1,116 +0,0 @@ -package cvss - -import "testing" - -func TestV2KeyString(t *testing.T) { - tests := []struct { - key v2Key - exp string - } { - { v2AccessVector, "AV" }, - { v2AccessComplexity, "AC" }, - { v2Authentication, "Au" }, - { v2ConfidentialityImpact, "C" }, - { v2IntegrityImpact, "I" }, - { v2AvailabilityImpact, "A" }, - { v2Exploitability, "E" }, - { v2RemediationLevel, "RL" }, - { v2ReportConfidence, "RC" }, - { v2CollateralDamagePotential, "CDP" }, - { v2TargetDistribution, "TD" }, - { v2ConfidentialityRequirement, "CR" }, - { v2IntegrityRequirement, "IR" }, - { v2AvailabilityRequirement, "AR" }, - - { v2Key(255), "v2Key(255)" }, - } - - for _, test := range(tests) { - t.Run(test.exp, func(t *testing.T) { - got := test.key.String() - if got != test.exp { - t.Errorf("got: \"%s\", exp: \"%s\"", got, test.exp) - } - }) - } -} - -func TestV2KeyName(t *testing.T) { - tests := []struct { - key v2Key - exp string - } { - { v2AccessVector, "Access Vector" }, - { v2AccessComplexity, "Access Complexity" }, - { v2Authentication, "Authentication" }, - { v2ConfidentialityImpact, "Confidentiality Impact" }, - { v2IntegrityImpact, "Integrity Impact" }, - { v2AvailabilityImpact, "Availability Impact" }, - { v2Exploitability, "Exploitability" }, - { v2RemediationLevel, "Remediation Level" }, - { v2ReportConfidence, "Report Confidence" }, - { v2CollateralDamagePotential, "Collateral Damage Potential" }, - { v2TargetDistribution, "Target Distribution" }, - { v2ConfidentialityRequirement, "Confidentiality Requirement" }, - { v2IntegrityRequirement, "Integrity Requirement" }, - { v2AvailabilityRequirement, "Availability Requirement" }, - } - - for _, test := range(tests) { - t.Run(test.exp, func(t *testing.T) { - got := test.key.Name() - if got != test.exp { - t.Errorf("got: \"%s\", exp: \"%s\"", got, test.exp) - } - }) - } -} - -func TestV2KeyCategory(t *testing.T) { - tests := []struct { - key v2Key - exp Category - } { - { v2AccessVector, Base }, - { v2AccessComplexity, Base }, - { v2Authentication, Base }, - { v2ConfidentialityImpact, Base }, - { v2IntegrityImpact, Base }, - { v2AvailabilityImpact, Base }, - { v2Exploitability, Temporal }, - { v2RemediationLevel, Temporal }, - { v2ReportConfidence, Temporal }, - { v2CollateralDamagePotential, Environmental }, - { v2TargetDistribution, Environmental}, - { v2ConfidentialityRequirement, Environmental}, - { v2IntegrityRequirement, Environmental}, - { v2AvailabilityRequirement, Environmental}, - } - - for _, test := range(tests) { - t.Run(test.key.String(), func(t *testing.T) { - got := test.key.Category() - if got != test.exp { - t.Errorf("got: \"%s\", exp: \"%s\"", got, test.exp) - } - }) - } -} - -func TestInvalidV2KeyName(t *testing.T) { - exp := "invalid" - got := v2Key(255).Name() - - if got != exp { - t.Errorf("got: \"%s\", exp: \"%s\"", got, exp) - } -} - -func TestInvalidV2KeyCategory(t *testing.T) { - exp := InvalidCategory - got := v2Key(255).Category() - - if got != exp { - t.Errorf("got: \"%s\", exp: \"%s\"", got, exp) - } -} |