HELLO v3!!!
This commit is contained in:
48
spec/shared_examples/references.rb
Normal file
48
spec/shared_examples/references.rb
Normal file
@@ -0,0 +1,48 @@
|
||||
shared_examples WPScan::References do
|
||||
describe '#references_keys' do
|
||||
it 'contains the :wpvulndb symbol' do
|
||||
expect(subject.class.references_keys)
|
||||
.to include(:wpvulndb)
|
||||
end
|
||||
end
|
||||
|
||||
describe 'references' do
|
||||
context 'when no references' do
|
||||
its(:wpvulndb_ids) { should eql([]) }
|
||||
its(:wpvulndb_urls) { should eql([]) }
|
||||
its(:references_urls) { should eql([]) }
|
||||
end
|
||||
|
||||
context 'when an unknown reference key is provided' do
|
||||
let(:references) { { cve: 1, unknown: 12 } }
|
||||
|
||||
its(:references) { should eql(cve: %w[1]) }
|
||||
end
|
||||
|
||||
context 'when references provided as string' do
|
||||
let(:references) do
|
||||
{
|
||||
cve: 11,
|
||||
wpvulndb: 12
|
||||
}
|
||||
end
|
||||
|
||||
its(:cves) { should eql %w[11] }
|
||||
its(:cve_urls) { should eql %w[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11] }
|
||||
|
||||
its(:wpvulndb_ids) { should eql %w[12] }
|
||||
its(:wpvulndb_urls) { should eql %w[https://wpvulndb.com/vulnerabilities/12] }
|
||||
|
||||
its(:references_urls) do
|
||||
should eql [
|
||||
'https://wpvulndb.com/vulnerabilities/12',
|
||||
'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-11'
|
||||
]
|
||||
end
|
||||
end
|
||||
|
||||
context 'when references provided as array' do
|
||||
xit
|
||||
end
|
||||
end
|
||||
end
|
||||
Reference in New Issue
Block a user