@@ -18,7 +18,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
18
18
tests := []appsecRuleTest {
19
19
{
20
20
name : "no rule : check return code" ,
21
- expected_load_ok : true ,
22
21
inband_rules : []appsec_rule.CustomRule {
23
22
{
24
23
Name : "rule1" ,
@@ -46,7 +45,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
46
45
},
47
46
{
48
47
name : "on_match: change return code" ,
49
- expected_load_ok : true ,
50
48
inband_rules : []appsec_rule.CustomRule {
51
49
{
52
50
Name : "rule1" ,
@@ -77,7 +75,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
77
75
},
78
76
{
79
77
name : "on_match: change action to a non standard one (log)" ,
80
- expected_load_ok : true ,
81
78
inband_rules : []appsec_rule.CustomRule {
82
79
{
83
80
Name : "rule1" ,
@@ -108,7 +105,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
108
105
},
109
106
{
110
107
name : "on_match: change action to another standard one (allow)" ,
111
- expected_load_ok : true ,
112
108
inband_rules : []appsec_rule.CustomRule {
113
109
{
114
110
Name : "rule1" ,
@@ -137,7 +133,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
137
133
},
138
134
{
139
135
name : "on_match: change action to another standard one (ban)" ,
140
- expected_load_ok : true ,
141
136
inband_rules : []appsec_rule.CustomRule {
142
137
{
143
138
Name : "rule1" ,
@@ -164,7 +159,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
164
159
},
165
160
{
166
161
name : "on_match: change action to another standard one (captcha)" ,
167
- expected_load_ok : true ,
168
162
inband_rules : []appsec_rule.CustomRule {
169
163
{
170
164
Name : "rule1" ,
@@ -191,7 +185,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
191
185
},
192
186
{
193
187
name : "on_match: change action to a non standard one" ,
194
- expected_load_ok : true ,
195
188
inband_rules : []appsec_rule.CustomRule {
196
189
{
197
190
Name : "rule1" ,
@@ -220,7 +213,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
220
213
},
221
214
{
222
215
name : "on_match: cancel alert" ,
223
- expected_load_ok : true ,
224
216
inband_rules : []appsec_rule.CustomRule {
225
217
{
226
218
Name : "rule42" ,
@@ -248,7 +240,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
248
240
},
249
241
{
250
242
name : "on_match: cancel event" ,
251
- expected_load_ok : true ,
252
243
inband_rules : []appsec_rule.CustomRule {
253
244
{
254
245
Name : "rule42" ,
@@ -276,7 +267,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
276
267
},
277
268
{
278
269
name : "on_match: on_success break" ,
279
- expected_load_ok : true ,
280
270
inband_rules : []appsec_rule.CustomRule {
281
271
{
282
272
Name : "rule42" ,
@@ -305,7 +295,6 @@ func TestAppsecOnMatchHooks(t *testing.T) {
305
295
},
306
296
{
307
297
name : "on_match: on_success continue" ,
308
- expected_load_ok : true ,
309
298
inband_rules : []appsec_rule.CustomRule {
310
299
{
311
300
Name : "rule42" ,
@@ -345,7 +334,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
345
334
tests := []appsecRuleTest {
346
335
{
347
336
name : "Basic pre_eval hook to disable inband rule" ,
348
- expected_load_ok : true ,
349
337
inband_rules : []appsec_rule.CustomRule {
350
338
{
351
339
Name : "rule1" ,
@@ -373,7 +361,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
373
361
},
374
362
{
375
363
name : "Basic pre_eval fails to disable rule" ,
376
- expected_load_ok : true ,
377
364
inband_rules : []appsec_rule.CustomRule {
378
365
{
379
366
Name : "rule1" ,
@@ -408,7 +395,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
408
395
},
409
396
{
410
397
name : "pre_eval : disable inband by tag" ,
411
- expected_load_ok : true ,
412
398
inband_rules : []appsec_rule.CustomRule {
413
399
{
414
400
Name : "rulez" ,
@@ -436,7 +422,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
436
422
},
437
423
{
438
424
name : "pre_eval : disable inband by ID" ,
439
- expected_load_ok : true ,
440
425
inband_rules : []appsec_rule.CustomRule {
441
426
{
442
427
Name : "rulez" ,
@@ -464,7 +449,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
464
449
},
465
450
{
466
451
name : "pre_eval : disable inband by name" ,
467
- expected_load_ok : true ,
468
452
inband_rules : []appsec_rule.CustomRule {
469
453
{
470
454
Name : "rulez" ,
@@ -492,7 +476,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
492
476
},
493
477
{
494
478
name : "pre_eval : outofband default behavior" ,
495
- expected_load_ok : true ,
496
479
outofband_rules : []appsec_rule.CustomRule {
497
480
{
498
481
Name : "rulez" ,
@@ -523,7 +506,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
523
506
},
524
507
{
525
508
name : "pre_eval : set remediation by tag" ,
526
- expected_load_ok : true ,
527
509
inband_rules : []appsec_rule.CustomRule {
528
510
{
529
511
Name : "rulez" ,
@@ -550,7 +532,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
550
532
},
551
533
{
552
534
name : "pre_eval : set remediation by name" ,
553
- expected_load_ok : true ,
554
535
inband_rules : []appsec_rule.CustomRule {
555
536
{
556
537
Name : "rulez" ,
@@ -577,7 +558,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
577
558
},
578
559
{
579
560
name : "pre_eval : set remediation by ID" ,
580
- expected_load_ok : true ,
581
561
inband_rules : []appsec_rule.CustomRule {
582
562
{
583
563
Name : "rulez" ,
@@ -606,7 +586,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
606
586
},
607
587
{
608
588
name : "pre_eval : on_success continue" ,
609
- expected_load_ok : true ,
610
589
inband_rules : []appsec_rule.CustomRule {
611
590
{
612
591
Name : "rulez" ,
@@ -634,7 +613,6 @@ func TestAppsecPreEvalHooks(t *testing.T) {
634
613
},
635
614
{
636
615
name : "pre_eval : on_success break" ,
637
- expected_load_ok : true ,
638
616
inband_rules : []appsec_rule.CustomRule {
639
617
{
640
618
Name : "rulez" ,
@@ -674,7 +652,6 @@ func TestAppsecRemediationConfigHooks(t *testing.T) {
674
652
tests := []appsecRuleTest {
675
653
{
676
654
name : "Basic matching rule" ,
677
- expected_load_ok : true ,
678
655
inband_rules : []appsec_rule.CustomRule {
679
656
{
680
657
Name : "rule1" ,
@@ -699,7 +676,6 @@ func TestAppsecRemediationConfigHooks(t *testing.T) {
699
676
},
700
677
{
701
678
name : "SetRemediation" ,
702
- expected_load_ok : true ,
703
679
inband_rules : []appsec_rule.CustomRule {
704
680
{
705
681
Name : "rule1" ,
@@ -726,7 +702,6 @@ func TestAppsecRemediationConfigHooks(t *testing.T) {
726
702
},
727
703
{
728
704
name : "SetRemediation" ,
729
- expected_load_ok : true ,
730
705
inband_rules : []appsec_rule.CustomRule {
731
706
{
732
707
Name : "rule1" ,
@@ -763,7 +738,6 @@ func TestOnMatchRemediationHooks(t *testing.T) {
763
738
tests := []appsecRuleTest {
764
739
{
765
740
name : "set remediation to allow with on_match hook" ,
766
- expected_load_ok : true ,
767
741
inband_rules : []appsec_rule.CustomRule {
768
742
{
769
743
Name : "rule42" ,
@@ -789,7 +763,6 @@ func TestOnMatchRemediationHooks(t *testing.T) {
789
763
},
790
764
{
791
765
name : "set remediation to captcha + custom user code with on_match hook" ,
792
- expected_load_ok : true ,
793
766
inband_rules : []appsec_rule.CustomRule {
794
767
{
795
768
Name : "rule42" ,
@@ -821,7 +794,6 @@ func TestOnMatchRemediationHooks(t *testing.T) {
821
794
},
822
795
{
823
796
name : "on_match: on_success break" ,
824
- expected_load_ok : true ,
825
797
inband_rules : []appsec_rule.CustomRule {
826
798
{
827
799
Name : "rule42" ,
@@ -854,7 +826,6 @@ func TestOnMatchRemediationHooks(t *testing.T) {
854
826
},
855
827
{
856
828
name : "on_match: on_success continue" ,
857
- expected_load_ok : true ,
858
829
inband_rules : []appsec_rule.CustomRule {
859
830
{
860
831
Name : "rule42" ,
0 commit comments