diff --git a/main.go b/main.go index d320e47d04b..f252c22cf7e 100644 --- a/main.go +++ b/main.go @@ -117,7 +117,7 @@ var ( disabledBuiltins = util.NewFlagSet() enableK8sCel = flag.Bool("experimental-enable-k8s-native-validation", false, "Alpha: enable the validating admission policy driver") externaldataProviderResponseCacheTTL = flag.Duration("external-data-provider-response-cache-ttl", 3*time.Minute, "TTL for the external data provider response cache. Specify the duration in 'h', 'm', or 's' for hours, minutes, or seconds respectively. Defaults to 3 minutes if unspecified. Setting the TTL to 0 disables the cache.") - deferAdmissionToVAP = flag.Bool("defer-admission-to-vap", false, "When set to false, Gatekeeper webhook can act as a fallback in case K8s' Validating Admission Policy fails. When set to true, Gatekeeper validating webhook will not evaluate a policy for an admission request it expects vap to enforce. May improve resource usage at the cost of race conditions detecting whether VAP enforcement is in effect. This does not impact audit results. Defaults to false.") + deferAdmissionToVAP = flag.Bool("defer-admission-to-vap", false, "When set to false, Gatekeeper webhook can act as a fallback in case K8s' Validating Admission Policy fails. When set to true, Gatekeeper validating webhook will not evaluate a policy for an admission request it expects vap to enforce. May improve resource usage at the cost of race conditions detecting whether VAP enforcement is in effect. This does not impact audit results. Defaults to false.") ) func init() { diff --git a/test/pubsub/fake-subscriber/main.go b/test/pubsub/fake-subscriber/main.go index fadd3aac2c9..69bd1229096 100644 --- a/test/pubsub/fake-subscriber/main.go +++ b/test/pubsub/fake-subscriber/main.go @@ -9,28 +9,9 @@ import ( "github.com/dapr/go-sdk/service/common" daprd "github.com/dapr/go-sdk/service/http" + "github.com/open-policy-agent/gatekeeper/v3/pkg/audit" ) -type PubsubMsg struct { - ID string `json:"id,omitempty"` - Details interface{} `json:"details,omitempty"` - EventType string `json:"eventType,omitempty"` - Group string `json:"group,omitempty"` - Version string `json:"version,omitempty"` - Kind string `json:"kind,omitempty"` - Name string `json:"name,omitempty"` - Namespace string `json:"namespace,omitempty"` - Message string `json:"message,omitempty"` - EnforcementAction string `json:"enforcementAction,omitempty"` - ConstraintAnnotations map[string]string `json:"constraintAnnotations,omitempty"` - ResourceGroup string `json:"resourceGroup,omitempty"` - ResourceAPIVersion string `json:"resourceAPIVersion,omitempty"` - ResourceKind string `json:"resourceKind,omitempty"` - ResourceNamespace string `json:"resourceNamespace,omitempty"` - ResourceName string `json:"resourceName,omitempty"` - ResourceLabels map[string]string `json:"resourceLabels,omitempty"` -} - func main() { auditChannel := os.Getenv("AUDIT_CHANNEL") if auditChannel == "" { @@ -52,7 +33,7 @@ func main() { } func eventHandler(_ context.Context, e *common.TopicEvent) (retry bool, err error) { - var msg PubsubMsg + var msg audit.PubsubMsg jsonInput, err := strconv.Unquote(string(e.RawData)) if err != nil { log.Fatalf("error unquoting %v", err)