|
12 | 12 | TEST_URL = "https://api.revenera.com" |
13 | 13 | TEST_API_TOKEN = "your_api_token" |
14 | 14 |
|
| 15 | + |
15 | 16 | class TestExperimental: |
16 | 17 | @pytest.fixture |
17 | 18 | def client(self): |
18 | 19 | return CodeInsightClient(TEST_URL, TEST_API_TOKEN, experimental=True) |
19 | | - |
| 20 | + |
20 | 21 | def test_experimental_enabled(self, client): |
21 | 22 | assert client.experimental_enabled == True |
22 | | - |
| 23 | + |
23 | 24 | def test_get_project_vulnerabilities(self, client): |
24 | 25 | project_id = 1 |
25 | 26 | total_pages = 4 |
@@ -85,11 +86,21 @@ def test_get_project_vulnerabilities(self, client): |
85 | 86 | "vulnerabilityCvssV3Severity":"CRITICAL"} ] } |
86 | 87 | """ |
87 | 88 | with requests_mock.Mocker() as m: |
88 | | - m.get(f"{TEST_URL}/codeinsight/api/projects/{project_id}/inventorySummary", |
89 | | - text=fake_response_json, headers=response_header) |
90 | | - m.get(f"{TEST_URL}/codeinsight/api/inventories/12346/vulnerabilities", |
91 | | - text=mock_resp_vuln, headers=response_header) |
92 | | - vulnerable_items = client.experimental.get_project_vulnerabilities(project_id) |
| 89 | + m.get( |
| 90 | + f"{TEST_URL}/codeinsight/api/projects/{project_id}/inventorySummary", |
| 91 | + text=fake_response_json, |
| 92 | + headers=response_header, |
| 93 | + ) |
| 94 | + m.get( |
| 95 | + f"{TEST_URL}/codeinsight/api/inventories/12346/vulnerabilities", |
| 96 | + text=mock_resp_vuln, |
| 97 | + headers=response_header, |
| 98 | + ) |
| 99 | + vulnerable_items = client.experimental.get_project_vulnerabilities( |
| 100 | + project_id |
| 101 | + ) |
93 | 102 | assert len(vulnerable_items) > 0 |
94 | 103 | assert vulnerable_items[0].vulnerabilities is not None |
95 | | - assert vulnerable_items[0].vulnerabilities[1].vulnerabilityName == "CVE-987-65432" |
| 104 | + assert ( |
| 105 | + vulnerable_items[0].vulnerabilities[1].vulnerabilityName == "CVE-987-65432" |
| 106 | + ) |
0 commit comments