aboutsummaryrefslogtreecommitdiff
path: root/internal/cvss/v2key_test.go
diff options
context:
space:
mode:
authorPaul Duncan <pabs@pablotron.org>2022-02-04 00:35:31 -0500
committerPaul Duncan <pabs@pablotron.org>2022-02-04 00:35:31 -0500
commit9c17b97cd0f83be3fff9fa4e87fd1d29052ea616 (patch)
tree0d97030a0d0c3ad983be281ce89f80571338887f /internal/cvss/v2key_test.go
parent92400d731546557d110c9c3cc3906d700f83dda8 (diff)
downloadcvez-9c17b97cd0f83be3fff9fa4e87fd1d29052ea616.tar.bz2
cvez-9c17b97cd0f83be3fff9fa4e87fd1d29052ea616.zip
rename to github.com/pablotron/cvez, remove internal libs
Diffstat (limited to 'internal/cvss/v2key_test.go')
-rw-r--r--internal/cvss/v2key_test.go116
1 files changed, 0 insertions, 116 deletions
diff --git a/internal/cvss/v2key_test.go b/internal/cvss/v2key_test.go
deleted file mode 100644
index a54f4e7..0000000
--- a/internal/cvss/v2key_test.go
+++ /dev/null
@@ -1,116 +0,0 @@
-package cvss
-
-import "testing"
-
-func TestV2KeyString(t *testing.T) {
- tests := []struct {
- key v2Key
- exp string
- } {
- { v2AccessVector, "AV" },
- { v2AccessComplexity, "AC" },
- { v2Authentication, "Au" },
- { v2ConfidentialityImpact, "C" },
- { v2IntegrityImpact, "I" },
- { v2AvailabilityImpact, "A" },
- { v2Exploitability, "E" },
- { v2RemediationLevel, "RL" },
- { v2ReportConfidence, "RC" },
- { v2CollateralDamagePotential, "CDP" },
- { v2TargetDistribution, "TD" },
- { v2ConfidentialityRequirement, "CR" },
- { v2IntegrityRequirement, "IR" },
- { v2AvailabilityRequirement, "AR" },
-
- { v2Key(255), "v2Key(255)" },
- }
-
- for _, test := range(tests) {
- t.Run(test.exp, func(t *testing.T) {
- got := test.key.String()
- if got != test.exp {
- t.Errorf("got: \"%s\", exp: \"%s\"", got, test.exp)
- }
- })
- }
-}
-
-func TestV2KeyName(t *testing.T) {
- tests := []struct {
- key v2Key
- exp string
- } {
- { v2AccessVector, "Access Vector" },
- { v2AccessComplexity, "Access Complexity" },
- { v2Authentication, "Authentication" },
- { v2ConfidentialityImpact, "Confidentiality Impact" },
- { v2IntegrityImpact, "Integrity Impact" },
- { v2AvailabilityImpact, "Availability Impact" },
- { v2Exploitability, "Exploitability" },
- { v2RemediationLevel, "Remediation Level" },
- { v2ReportConfidence, "Report Confidence" },
- { v2CollateralDamagePotential, "Collateral Damage Potential" },
- { v2TargetDistribution, "Target Distribution" },
- { v2ConfidentialityRequirement, "Confidentiality Requirement" },
- { v2IntegrityRequirement, "Integrity Requirement" },
- { v2AvailabilityRequirement, "Availability Requirement" },
- }
-
- for _, test := range(tests) {
- t.Run(test.exp, func(t *testing.T) {
- got := test.key.Name()
- if got != test.exp {
- t.Errorf("got: \"%s\", exp: \"%s\"", got, test.exp)
- }
- })
- }
-}
-
-func TestV2KeyCategory(t *testing.T) {
- tests := []struct {
- key v2Key
- exp Category
- } {
- { v2AccessVector, Base },
- { v2AccessComplexity, Base },
- { v2Authentication, Base },
- { v2ConfidentialityImpact, Base },
- { v2IntegrityImpact, Base },
- { v2AvailabilityImpact, Base },
- { v2Exploitability, Temporal },
- { v2RemediationLevel, Temporal },
- { v2ReportConfidence, Temporal },
- { v2CollateralDamagePotential, Environmental },
- { v2TargetDistribution, Environmental},
- { v2ConfidentialityRequirement, Environmental},
- { v2IntegrityRequirement, Environmental},
- { v2AvailabilityRequirement, Environmental},
- }
-
- for _, test := range(tests) {
- t.Run(test.key.String(), func(t *testing.T) {
- got := test.key.Category()
- if got != test.exp {
- t.Errorf("got: \"%s\", exp: \"%s\"", got, test.exp)
- }
- })
- }
-}
-
-func TestInvalidV2KeyName(t *testing.T) {
- exp := "invalid"
- got := v2Key(255).Name()
-
- if got != exp {
- t.Errorf("got: \"%s\", exp: \"%s\"", got, exp)
- }
-}
-
-func TestInvalidV2KeyCategory(t *testing.T) {
- exp := InvalidCategory
- got := v2Key(255).Category()
-
- if got != exp {
- t.Errorf("got: \"%s\", exp: \"%s\"", got, exp)
- }
-}