@@ -18,8 +18,7 @@ describe("ApiGWMutualTls", () => {
1818 const ruleId = "ApiGWMutualTls"
1919 test ( "Non-compliant when mutual TLS is not enabled" , ( ) => {
2020 new CfnDomainName ( stack , "TestDomain" , {
21- domainName : "test.example.com" ,
22- securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 "
21+ domainName : "test.example.com"
2322 } )
2423
2524 // Validate
@@ -28,7 +27,6 @@ describe("ApiGWMutualTls", () => {
2827 test ( "Compliant when mutual TLS is enabled" , ( ) => {
2928 new CfnDomainName ( stack , "TestDomain" , {
3029 domainName : "test.example.com" ,
31- securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 " ,
3230 mutualTlsAuthentication : {
3331 truststoreUri : "truststoreUri" ,
3432 truststoreVersion : "truststoreVersion"
@@ -42,7 +40,6 @@ describe("ApiGWMutualTls", () => {
4240 test ( "Non-compliant when mutual TLS is missing trustStoreVersion" , ( ) => {
4341 new CfnDomainName ( stack , "TestDomain" , {
4442 domainName : "test.example.com" ,
45- securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 " ,
4643 mutualTlsAuthentication : {
4744 truststoreUri : "truststoreUri"
4845 }
@@ -54,8 +51,7 @@ describe("ApiGWMutualTls", () => {
5451 test ( "Compliant when mutual TLS is not enabled in a pull request" , ( ) => {
5552 stack . node . setContext ( "isPullRequest" , true )
5653 new CfnDomainName ( stack , "TestDomain" , {
57- domainName : "test.example.com" ,
58- securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 "
54+ domainName : "test.example.com"
5955 } )
6056
6157 // Validate
@@ -64,8 +60,7 @@ describe("ApiGWMutualTls", () => {
6460 test ( "Compliant when mutual TLS is not enabled in not a pull request" , ( ) => {
6561 stack . node . setContext ( "isPullRequest" , false )
6662 new CfnDomainName ( stack , "TestDomain" , {
67- domainName : "test.example.com" ,
68- securityPolicy : "SecurityPolicy_TLS13_1_3_2025_09 "
63+ domainName : "test.example.com"
6964 } )
7065
7166 // Validate
0 commit comments