@@ -33,15 +33,15 @@ func TestGatewayRuleNewWithOptionalParams(t *testing.T) {
33
33
Action : cloudflare .F (zero_trust .GatewayRuleNewParamsActionOn ),
34
34
Name : cloudflare .F ("block bad websites" ),
35
35
Description : cloudflare .F ("Block bad websites based on their host name." ),
36
- DevicePosture : cloudflare .F (" any(device_posture.checks.passed[*] in {\ " 1308749e-fcfb-4ebc-b051-fe022b632644\ " })" ),
36
+ DevicePosture : cloudflare .F (` any(device_posture.checks.passed[*] in {"1308749e-fcfb-4ebc-b051-fe022b632644"})` ),
37
37
Enabled : cloudflare .F (true ),
38
38
Expiration : cloudflare .F (zero_trust.GatewayRuleNewParamsExpiration {
39
39
ExpiresAt : cloudflare .F (time .Now ()),
40
40
Duration : cloudflare .F (int64 (10 )),
41
41
Expired : cloudflare .F (false ),
42
42
}),
43
43
Filters : cloudflare .F ([]zero_trust.GatewayFilter {zero_trust .GatewayFilterHTTP }),
44
- Identity : cloudflare .F (" any(identity.groups.name[*] in {\ " finance\ " })" ),
44
+ Identity : cloudflare .F (` any(identity.groups.name[*] in {"finance"})` ),
45
45
Precedence : cloudflare .F (int64 (0 )),
46
46
RuleSettings : cloudflare .F (zero_trust.RuleSettingParam {
47
47
AddHeaders : cloudflare .F (map [string ]string {
@@ -131,7 +131,7 @@ func TestGatewayRuleNewWithOptionalParams(t *testing.T) {
131
131
Tue : cloudflare .F ("08:00-12:30,13:30-17:00" ),
132
132
Wed : cloudflare .F ("08:00-12:30,13:30-17:00" ),
133
133
}),
134
- Traffic : cloudflare .F (" http.request.uri matches \ " .*a/partial/uri.*\ " and http.request.host in $01302951-49f9-47c9-a400-0297e60b6a10" ),
134
+ Traffic : cloudflare .F (` http.request.uri matches ".*a/partial/uri.*" and http.request.host in $01302951-49f9-47c9-a400-0297e60b6a10` ),
135
135
})
136
136
if err != nil {
137
137
var apierr * cloudflare.Error
@@ -163,15 +163,15 @@ func TestGatewayRuleUpdateWithOptionalParams(t *testing.T) {
163
163
Action : cloudflare .F (zero_trust .GatewayRuleUpdateParamsActionOn ),
164
164
Name : cloudflare .F ("block bad websites" ),
165
165
Description : cloudflare .F ("Block bad websites based on their host name." ),
166
- DevicePosture : cloudflare .F (" any(device_posture.checks.passed[*] in {\ " 1308749e-fcfb-4ebc-b051-fe022b632644\ " })" ),
166
+ DevicePosture : cloudflare .F (` any(device_posture.checks.passed[*] in {"1308749e-fcfb-4ebc-b051-fe022b632644"})` ),
167
167
Enabled : cloudflare .F (true ),
168
168
Expiration : cloudflare .F (zero_trust.GatewayRuleUpdateParamsExpiration {
169
169
ExpiresAt : cloudflare .F (time .Now ()),
170
170
Duration : cloudflare .F (int64 (10 )),
171
171
Expired : cloudflare .F (false ),
172
172
}),
173
173
Filters : cloudflare .F ([]zero_trust.GatewayFilter {zero_trust .GatewayFilterHTTP }),
174
- Identity : cloudflare .F (" any(identity.groups.name[*] in {\ " finance\ " })" ),
174
+ Identity : cloudflare .F (` any(identity.groups.name[*] in {"finance"})` ),
175
175
Precedence : cloudflare .F (int64 (0 )),
176
176
RuleSettings : cloudflare .F (zero_trust.RuleSettingParam {
177
177
AddHeaders : cloudflare .F (map [string ]string {
@@ -261,7 +261,7 @@ func TestGatewayRuleUpdateWithOptionalParams(t *testing.T) {
261
261
Tue : cloudflare .F ("08:00-12:30,13:30-17:00" ),
262
262
Wed : cloudflare .F ("08:00-12:30,13:30-17:00" ),
263
263
}),
264
- Traffic : cloudflare .F (" http.request.uri matches \ " .*a/partial/uri.*\ " and http.request.host in $01302951-49f9-47c9-a400-0297e60b6a10" ),
264
+ Traffic : cloudflare .F (` http.request.uri matches ".*a/partial/uri.*" and http.request.host in $01302951-49f9-47c9-a400-0297e60b6a10` ),
265
265
},
266
266
)
267
267
if err != nil {
0 commit comments