From 237f6638a0db2d9817e8acd42f6d92598ca2d431 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C5=A0est=C3=A1k=20V=C3=ADt?= Date: Fri, 24 Jan 2020 12:26:41 +0100 Subject: [PATCH] Revert "Added some tests" This reverts commit 70984229f021ccf0c517622470d5310fe9d73cc2. --- test/VulnerabilitySpec.scala | 9 --------- 1 file changed, 9 deletions(-) diff --git a/test/VulnerabilitySpec.scala b/test/VulnerabilitySpec.scala index 73078b2..33b2799 100644 --- a/test/VulnerabilitySpec.scala +++ b/test/VulnerabilitySpec.scala @@ -10,12 +10,6 @@ class VulnerabilitySpec extends Specification { VulnerableSoftware(allPreviousVersion = false, "cpe:/a:asd:asd:1.0") ), Seq()) - val nonCpeVuln = Vulnerability("some-vuln", None, CvssRating(None, None, None, None, None, None, None), "descr", Seq( - VulnerableSoftware(allPreviousVersion = false, "cpex:/a:ftp:ftp"), - VulnerableSoftware(allPreviousVersion = false, "cpex:/a:ssh:ssh:1.0"), - VulnerableSoftware(allPreviousVersion = false, "cpex:/a:asd:asd:1.0") - ), Seq()) - def id(name: String) = Identifier(name = name, confidence = Confidence.Highest, url = "", identifierType = "cpe") @@ -38,9 +32,6 @@ class VulnerabilitySpec extends Specification { "when it matches without version, but it also matches with version and everything matches" >> { vuln.likelyMatchesOnlyWithoutVersion(Set(id("cpe:/a:ftp:ftp:1.0"), id("cpe:/a:ssh:ssh:1.0"), id("cpe:/a:asd:asd:1.0"))) should beFalse } - "for non-CPE identifiers, as they are not supported" >> { - nonCpeVuln.likelyMatchesOnlyWithoutVersion(Set(id("cpe:/a:ftp:ftp:1.0"))) should beFalse - } } // TODO: Add tests for version matching; They would not pass now, though. }