From c360e9c18f9a93e34884fb6ee51c739f19e9280c Mon Sep 17 00:00:00 2001 From: Imran Nayer Date: Tue, 17 Oct 2023 13:37:28 -0500 Subject: [PATCH] fix test for rule.rate_limit_options.enforce_on_key --- test/integration/security-policy-all/security_policy_test.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/test/integration/security-policy-all/security_policy_test.go b/test/integration/security-policy-all/security_policy_test.go index d75b084..c4e0fd7 100644 --- a/test/integration/security-policy-all/security_policy_test.go +++ b/test/integration/security-policy-all/security_policy_test.go @@ -54,7 +54,7 @@ func TestSecurityPolicyAll(t *testing.T) { assert.Equal("throttle", sp.Get("action").String(), "priority 2 rule has expected action") assert.Equal("XSS Sensitivity Level 2 with excluded rules", sp.Get("description").String(), "priority 2 rule has expected description") assert.Equal("allow", sp.Get("rateLimitOptions.conformAction").String(), "priority 2 rule has expected Rate limit confirm action") - assert.Equal("ALL", sp.Get("rateLimitOptions.enforceOnKey").String(), "priority 2 rule has expected Rate limit enforce on key") + assert.Equal("", sp.Get("rateLimitOptions.enforceOnKey").String(), "priority 2 rule has expected Rate limit enforce on key") assert.Equal("deny(502)", sp.Get("rateLimitOptions.exceedAction").String(), "priority 2 rule has expected Rate limit exceed action") assert.Equal("10", sp.Get("rateLimitOptions.rateLimitThreshold.count").String(), "priority 2 rule has expected Rate limit threshold count") assert.Equal("60", sp.Get("rateLimitOptions.rateLimitThreshold.intervalSec").String(), "priority 2 rule has expected Rate limit threshold interval")