diff --git a/src/client/components/privacyEnhancedModel/privacyEnhancedModel.test.tsx b/src/client/components/privacyEnhancedModel/privacyEnhancedModel.test.tsx
index 1233601..b5794aa 100644
--- a/src/client/components/privacyEnhancedModel/privacyEnhancedModel.test.tsx
+++ b/src/client/components/privacyEnhancedModel/privacyEnhancedModel.test.tsx
@@ -6,14 +6,14 @@ describe('privacy enhanced model', () => {
it('should provide link to model', () => {
const linkToModel = 'https://link/to/model';
- render();
+ render();
screen.getByText(linkToModel);
screen.getByRole('link');
});
- it('should not provide link to model if there is no modelRef', () => {
- render();
+ it('should not provide link to model if there is no modelReference', () => {
+ render();
expect(screen.queryByRole('link')).toBeNull();
});
diff --git a/src/client/components/privacyEnhancedModel/privacyEnhancedModel.tsx b/src/client/components/privacyEnhancedModel/privacyEnhancedModel.tsx
index 150b475..6d2e7ae 100644
--- a/src/client/components/privacyEnhancedModel/privacyEnhancedModel.tsx
+++ b/src/client/components/privacyEnhancedModel/privacyEnhancedModel.tsx
@@ -2,22 +2,22 @@ import type React from 'react';
import './privacyEnhancedModel.css';
interface PrivacyEnhancedModelProps {
- modelRef?: string;
+ modelReference?: string;
}
const PrivacyEnhancedModel: React.FC = ({
- modelRef,
+ modelReference,
}) => {
- if (modelRef) {
+ if (modelReference) {
return (
Threat Modelling
- {modelRef && (
+ {modelReference && (
<>
The model is hosted externally:
- {modelRef}
+ {modelReference}
{/* Note: React takes care about sanitization of user input above to prevent XSS */}