@@ -10,7 +10,7 @@ import (
1010
1111const (
1212 denyPolicyStr = `
13- package example
13+ package com.segment.kubeapply
1414
1515deny[msg] {
1616 input.apiVersion == "badVersion"
@@ -28,7 +28,7 @@ deny[msg] {
2828}`
2929
3030 allowPolicyStr = `
31- package example
31+ package com.segment.kubeapply
3232
3333default allow = true
3434
@@ -63,7 +63,7 @@ func TestPolicyChecker(t *testing.T) {
6363 policyModule : PolicyModule {
6464 Name : "testDenyPolicy" ,
6565 Contents : denyPolicyStr ,
66- Package : "example " ,
66+ Package : "com.segment.kubeapply " ,
6767 Result : "deny" ,
6868 },
6969 resource : MakeResource ("test/path" , []byte (goodVersionResourceStr ), 0 ),
@@ -78,7 +78,7 @@ func TestPolicyChecker(t *testing.T) {
7878 policyModule : PolicyModule {
7979 Name : "testDenyPolicy" ,
8080 Contents : denyPolicyStr ,
81- Package : "example " ,
81+ Package : "com.segment.kubeapply " ,
8282 Result : "deny" ,
8383 ExtraFields : map [string ]interface {}{
8484 "extraKey" : "goodValue" ,
@@ -99,7 +99,7 @@ func TestPolicyChecker(t *testing.T) {
9999 policyModule : PolicyModule {
100100 Name : "testDenyPolicy" ,
101101 Contents : denyPolicyStr ,
102- Package : "example " ,
102+ Package : "com.segment.kubeapply " ,
103103 Result : "deny" ,
104104 ExtraFields : map [string ]interface {}{
105105 "extraKey2" : "warnValue" ,
@@ -120,7 +120,7 @@ func TestPolicyChecker(t *testing.T) {
120120 policyModule : PolicyModule {
121121 Name : "testDenyPolicy" ,
122122 Contents : denyPolicyStr ,
123- Package : "example " ,
123+ Package : "com.segment.kubeapply " ,
124124 Result : "deny" ,
125125 ExtraFields : map [string ]interface {}{
126126 "extraKey" : "extraBadValue" ,
@@ -142,7 +142,7 @@ func TestPolicyChecker(t *testing.T) {
142142 policyModule : PolicyModule {
143143 Name : "testDenyPolicy" ,
144144 Contents : denyPolicyStr ,
145- Package : "example " ,
145+ Package : "com.segment.kubeapply " ,
146146 Result : "deny" ,
147147 ExtraFields : map [string ]interface {}{
148148 "extraKey" : "extraBadValue" ,
@@ -166,7 +166,7 @@ func TestPolicyChecker(t *testing.T) {
166166 policyModule : PolicyModule {
167167 Name : "testAllowPolicy" ,
168168 Contents : allowPolicyStr ,
169- Package : "example " ,
169+ Package : "com.segment.kubeapply " ,
170170 Result : "allow" ,
171171 },
172172 resource : MakeResource ("test/path" , []byte (goodVersionResourceStr ), 0 ),
@@ -181,7 +181,7 @@ func TestPolicyChecker(t *testing.T) {
181181 policyModule : PolicyModule {
182182 Name : "testAllowPolicy" ,
183183 Contents : allowPolicyStr ,
184- Package : "example " ,
184+ Package : "com.segment.kubeapply " ,
185185 Result : "allow" ,
186186 },
187187 resource : MakeResource ("test/path" , []byte (badVersionResourceStr ), 0 ),
@@ -196,7 +196,7 @@ func TestPolicyChecker(t *testing.T) {
196196 policyModule : PolicyModule {
197197 Name : "testAllowPolicy" ,
198198 Contents : allowPolicyStr ,
199- Package : "example " ,
199+ Package : "com.segment.kubeapply " ,
200200 Result : "allow" ,
201201 },
202202 resource : MakeResource ("test/path" , []byte ("" ), 0 ),
0 commit comments