Skip to content

Commit

Permalink
spelling: vulnerability
Browse files Browse the repository at this point in the history
Signed-off-by: Josh Soref <[email protected]>
  • Loading branch information
jsoref committed Dec 26, 2022
1 parent 5f82001 commit 07a03e9
Show file tree
Hide file tree
Showing 4 changed files with 8 additions and 8 deletions.
8 changes: 4 additions & 4 deletions pkg/runtime/executor_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ func (m MockIacProvider) Name() string {
type MockPolicyEngine struct {
err error
}
type MockVulnerabiltyEngine struct {
type MockVulnerabilityEngine struct {
out vulnerability.EngineOutput
}

Expand All @@ -100,11 +100,11 @@ func (m MockPolicyEngine) Evaluate(input policy.EngineInput, filter policy.PreSc
return out, m.err
}

func (m MockVulnerabiltyEngine) ReportVulnerability(input vulnerability.EngineInput, options map[string]interface{}) (out vulnerability.EngineOutput) {
func (m MockVulnerabilityEngine) ReportVulnerability(input vulnerability.EngineInput, options map[string]interface{}) (out vulnerability.EngineOutput) {
return m.out
}

func (m MockVulnerabiltyEngine) FetchVulnerabilities(input output.AllResourceConfigs, options map[string]interface{}) (out output.AllResourceConfigs) {
func (m MockVulnerabilityEngine) FetchVulnerabilities(input output.AllResourceConfigs, options map[string]interface{}) (out output.AllResourceConfigs) {
return out
}

Expand Down Expand Up @@ -194,7 +194,7 @@ func TestExecute(t *testing.T) {
iacProviders: []iacProvider.IacProvider{MockIacProvider{err: nil}},
notifiers: []notifications.Notifier{&MockNotifier{err: nil}},
policyEngines: []policy.Engine{MockPolicyEngine{err: nil}},
vulnerabilityEngine: MockVulnerabiltyEngine{
vulnerabilityEngine: MockVulnerabilityEngine{
out: vulnerability.EngineOutput{
XMLName: xml.Name{},
ViolationStore: results.NewViolationStore(),
Expand Down
2 changes: 1 addition & 1 deletion pkg/vulnerability/types.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ const (
sha256 = "sha256"
)

// VulEngine Implements the vulnerbaility engine interface
// VulEngine Implements the vulnerability engine interface
type VulEngine struct {
results EngineOutput
}
Expand Down
4 changes: 2 additions & 2 deletions pkg/vulnerability/vulnerability.go
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@ func getVulnerabilitiesByRepository(container output.ContainerDetails, options m
return []output.Vulnerability{}
}

// ReportVulnerability Add a vulnrability for a given resource in scan summary
// ReportVulnerability Add a vulnerability for a given resource in scan summary
func (v *VulEngine) ReportVulnerability(engineInput EngineInput, options map[string]interface{}) EngineOutput {
v.results.ViolationStore = results.NewViolationStore()
for _, resources := range *engineInput.InputData {
Expand All @@ -99,7 +99,7 @@ func (v *VulEngine) ReportVulnerability(engineInput EngineInput, options map[str
return v.results
}

// prepareVulnerabilityObject Add a vulnrability for a given resource
// prepareVulnerabilityObject Add a vulnerability for a given resource
func prepareVulnerabilityObject(container output.ContainerDetails, resource output.ResourceConfig, options map[string]interface{}) []*results.Vulnerability {
vulnerabilities := []*results.Vulnerability{}
for _, vul := range container.Vulnerabilities {
Expand Down
2 changes: 1 addition & 1 deletion test/e2e/vulnerability/vulnerability_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ const (
azureAuthKeyEnvName = "AZURE_AUTH_LOCATION"
)

var _ = Describe("Vulnerabilty", func() {
var _ = Describe("Vulnerability", func() {

BeforeSuite(func() {
terrascanBinaryPath = helper.GetTerrascanBinaryPath()
Expand Down

0 comments on commit 07a03e9

Please sign in to comment.