Skip to content
Snippets Groups Projects
Unverified Commit fb0d43ed authored by Etienne Baqué's avatar Etienne Baqué
Browse files

Merge branch 'minac_simplify_security_training_specs' into 'master'

parents aac8ddc2 b889449b
No related branches found
No related tags found
No related merge requests found
Loading
Loading
@@ -2,15 +2,15 @@
 
require 'spec_helper'
 
RSpec.describe Security::TrainingProviders::KontraUrlFinder do
RSpec.describe Security::TrainingProviders::KontraUrlFinder, feature_category: :vulnerability_management do
include ReactiveCachingHelpers
 
let_it_be(:provider_name) { 'Kontra' }
let_it_be(:provider) { create(:security_training_provider, name: provider_name) }
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'cwe', external_id: 2, name: "cwe-2") }
let_it_be(:dummy_url) { 'http://test.host/test' }
let_it_be(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
 
let(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
let(:finder) { described_class.new(identifier.project, provider, identifier_external_id) }
 
describe '#calculate_reactive_cache' do
Loading
Loading
@@ -42,7 +42,6 @@
 
context "when external_type is not present in allowed list" do
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'invalid type', external_id: "A1", name: "A1. Injection") }
let_it_be(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
 
it 'returns nil' do
expect(finder.execute).to be_nil
Loading
Loading
@@ -57,8 +56,6 @@
end
 
context "when identifier contains CWE-{number} format" do
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'cwe', external_id: "CWE-2") }
it 'returns full url path with proper mapping key' do
expect(finder.full_url).to eq('https://example.com/?cwe=2')
end
Loading
Loading
Loading
Loading
@@ -2,15 +2,15 @@
 
require 'spec_helper'
 
RSpec.describe Security::TrainingProviders::SecureCodeWarriorUrlFinder do
RSpec.describe Security::TrainingProviders::SecureCodeWarriorUrlFinder, feature_category: :vulnerability_management do
include ReactiveCachingHelpers
 
let_it_be(:provider_name) { 'Secure Code Warrior' }
let_it_be(:provider) { create(:security_training_provider, name: provider_name) }
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'cwe', external_id: 2, name: "cwe-2") }
let_it_be(:dummy_url) { 'http://test.host/test' }
let_it_be(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
 
let(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
let(:finder) { described_class.new(identifier.project, provider, identifier_external_id) }
 
describe '#execute' do
Loading
Loading
@@ -42,7 +42,6 @@
 
context "when external_type is not present in allowed list" do
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'invalid type', external_id: "A1", name: "A1. Injection") }
let_it_be(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
 
it 'returns nil' do
expect(finder.execute).to be_nil
Loading
Loading
@@ -63,7 +62,6 @@
 
context "when identifier contains owasp identifier" do
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'owasp', external_id: "A1", name: "A1. Injection") }
let_it_be(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
 
it 'returns full url path with proper mapping key' do
expect(finder.full_url).to eq("https://example.com/?Id=gitlab&MappingList=owasp-web-2017&MappingKey=A1")
Loading
Loading
@@ -84,7 +82,6 @@
describe '#determine_mapping_key' do
context 'when owasp' do
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'owasp', external_id: "A1", name: "A1. Injection") }
let_it_be(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
 
it 'returns external_id' do
expect(finder.determine_mapping_key).to eq(identifier.external_id)
Loading
Loading
@@ -93,7 +90,6 @@
 
context 'when cwe' do
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'cwe', external_id: 2, name: 'cwe-2') }
let_it_be(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
 
it 'returns parsed identifier name' do
expect(finder.determine_mapping_key).to eq(identifier.name.split('-').last)
Loading
Loading
@@ -104,7 +100,6 @@
describe '#determine_mapping_list' do
context 'when owasp' do
let(:identifier) { create(:vulnerabilities_identifier, external_type: 'owasp', external_id: external_id, name: name) }
let(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
 
context 'when owasp-web-2017' do
let(:external_id) { "A1" }
Loading
Loading
@@ -127,7 +122,6 @@
 
context 'when cwe' do
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'cwe', external_id: 2, name: 'cwe-2') }
let_it_be(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
 
it 'returns parsed identifier name' do
expect(finder.determine_mapping_list).to eq(identifier.external_type)
Loading
Loading
Loading
Loading
@@ -9,10 +9,8 @@
let_it_be(:provider) { create(:security_training_provider, name: provider_name) }
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'cwe', external_id: 2, name: "cwe-2") }
let_it_be(:dummy_url) { 'http://test.host/test' }
let_it_be(:identifier_external_id) do
"[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]"
end
 
let(:identifier_external_id) { "[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]" }
let(:finder) { described_class.new(identifier.project, provider, identifier_external_id) }
 
describe '#calculate_reactive_cache' do
Loading
Loading
@@ -60,10 +58,6 @@
create(:vulnerabilities_identifier, external_type: 'invalid type', external_id: "A1", name: "A1. Injection")
end
 
let_it_be(:identifier_external_id) do
"[#{identifier.external_type}]-[#{identifier.external_id}]-[#{identifier.name}]"
end
it 'returns nil' do
expect(finder.execute).to be_nil
end
Loading
Loading
@@ -77,8 +71,6 @@
end
 
context "when identifier contains CWE-{number} format" do
let_it_be(:identifier) { create(:vulnerabilities_identifier, external_type: 'cwe', external_id: "CWE-2") }
it 'returns full url path with proper mapping key' do
expect(finder.full_url).to eq('https://example.com/?cwe=2')
end
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment