diff --git a/adapter/internal/oasparser/envoyconf/listener_test.go b/adapter/internal/oasparser/envoyconf/listener_test.go index 09a64a482a..bbbb9235f7 100644 --- a/adapter/internal/oasparser/envoyconf/listener_test.go +++ b/adapter/internal/oasparser/envoyconf/listener_test.go @@ -45,7 +45,9 @@ func TestCreateListenerWithRds(t *testing.T) { "Address mismatch for secured Listener.") assert.NotEmpty(t, securedListener.FilterChains, "Filter chain for listener should not be null.") assert.NotNil(t, securedListener.FilterChains[0].GetTransportSocket(), - "Transport Socket should not be null for secured listener") + "Transport Socket should not be null for secured listener") + assert.Equal(t, 1048576, securedListener.PerConnectionBufferLimitBytes, + "Buffered payload limit mismatch for secured Listener.") nonSecuredListener := listeners[1] if nonSecuredListener.Validate() != nil { @@ -57,7 +59,9 @@ func TestCreateListenerWithRds(t *testing.T) { "Address mismatch for non-secured Listener.") assert.NotEmpty(t, nonSecuredListener.FilterChains, "Filter chain for listener should not be null.") assert.Nil(t, nonSecuredListener.FilterChains[0].GetTransportSocket(), - "Transport Socket should be null for non-secured listener") + "Transport Socket should be null for non-secured listener") + assert.Equal(t, 1048576, nonSecuredListener.PerConnectionBufferLimitBytes, + "Buffered payload limit mismatch for non-secured Listener.") } func TestCreateVirtualHost(t *testing.T) {