@@ -48,6 +48,62 @@ def test_get_cve_by_time_modified():
4848 assert len (json .loads (res .content .decode ())['cveRecords' ]) >= 2
4949
5050
51+ def test_get_cve_by_count_only_true ():
52+ """ count_only set to True using number 1 """
53+ res = requests .get (
54+ f'{ env .AWG_BASE_URL } { CVE_URL } /' ,
55+ headers = utils .BASE_HEADERS ,
56+ params = {
57+ 'count_only' : 1
58+ }
59+
60+ )
61+ assert len (json .loads (res .content .decode ())) == 1 # only count is returned
62+ assert json .loads (res .content .decode ())['totalCount' ] == 114
63+ assert res .status_code == 200
64+
65+
66+ def test_get_cve_by_count_only_false ():
67+ """ count_only set to False using number 0, returns all records"""
68+ res = requests .get (
69+ f'{ env .AWG_BASE_URL } { CVE_URL } /' ,
70+ headers = utils .BASE_HEADERS ,
71+ params = {
72+ 'count_only' : 0
73+ }
74+
75+ )
76+ print (json .loads (res .content .decode ()))
77+ assert len (json .loads (res .content .decode ())['cveRecords' ]) == 114 # all records are returned
78+ assert res .status_code == 200
79+
80+
81+ def test_get_cve_invalid_count_number ():
82+ """ count_only can only be set to 0 or 1 """
83+ res = requests .get (
84+ f'{ env .AWG_BASE_URL } { CVE_URL } /' ,
85+ headers = utils .BASE_HEADERS ,
86+ params = {
87+ 'count_only' : 11
88+ }
89+ )
90+ assert res .status_code == 400
91+ response_contains_json (res , 'error' , 'BAD_INPUT' )
92+
93+
94+ def test_get_cve_invalid_count_value ():
95+ """ count_only can only be set to 0 or 1 """
96+ res = requests .get (
97+ f'{ env .AWG_BASE_URL } { CVE_URL } /' ,
98+ headers = utils .BASE_HEADERS ,
99+ params = {
100+ 'count_only' : True
101+ }
102+ )
103+ assert res .status_code == 400
104+ response_contains_json (res , 'error' , 'BAD_INPUT' )
105+
106+
51107#### GET /cve/:id ####
52108def test_get_cve ():
53109 res = requests .get (
0 commit comments