diff --git a/pkg/smokescreen/smokescreen.go b/pkg/smokescreen/smokescreen.go index 67d8fe01..6c49af9b 100644 --- a/pkg/smokescreen/smokescreen.go +++ b/pkg/smokescreen/smokescreen.go @@ -1031,7 +1031,7 @@ func checkACLsForRequest(config *Config, req *http.Request, destination hostport if err != nil { config.Log.WithFields(logrus.Fields{ "error": err, - "Role": role, + "role": role, }).Warn("EgressAcl.Decide returned an error.") config.MetricsClient.Incr("acl.decide_error", 1) diff --git a/pkg/smokescreen/smokescreen_test.go b/pkg/smokescreen/smokescreen_test.go index a2d81f8e..22532981 100644 --- a/pkg/smokescreen/smokescreen_test.go +++ b/pkg/smokescreen/smokescreen_test.go @@ -1310,7 +1310,7 @@ func TestCONNECTProxyACLs(t *testing.T) { entry := findCanonicalProxyDecision(logHook.AllEntries()) r.NotNil(entry) r.Equal("connect proxy host not allowed in rule", entry.Data["decision_reason"]) - r.Equal("test-external-connect-proxy-blocked-srv", entry.Data["Role"]) + r.Equal("test-external-connect-proxy-blocked-srv", entry.Data["role"]) r.Equal(false, entry.Data["allow"]) }) @@ -1380,7 +1380,7 @@ func TestCONNECTProxyACLs(t *testing.T) { entry := findCanonicalProxyDecision(logHook.AllEntries()) r.NotNil(entry) r.Equal("host matched allowed domain in rule", entry.Data["decision_reason"]) - r.Equal("test-external-connect-proxy-allowed-srv", entry.Data["Role"]) + r.Equal("test-external-connect-proxy-allowed-srv", entry.Data["role"]) r.Equal(true, entry.Data["allow"]) })