ca0e1ca769
This is an initial import of the osel codebase. The osel tool is a tool that initiates external security scans (initially through Qualys) upon reciept of AMQP events that indicate certain sensitive events have occurred, like a security group rule change. The commit history had to be thrown away because it contained some non-public data, so I would like to call out the following contributors: This uses go 1.10 and vgo for dependency management. Co-Authored-By: Charles Bitter <Charles_Bitter@cable.comcast.com> Co-Authored-By: Olivier Gagnon <Olivier_Gagnon@cable.comcast.com> Co-Authored-By: Joseph Sleiman <Joseph_Sleiman@comcast.com> Change-Id: Ib6abe2024fd91978b783ceee4cff8bb4678d7b15
25 lines
440 B
Go
25 lines
440 B
Go
package main
|
|
|
|
import "log"
|
|
|
|
type SyslogTestActions struct {
|
|
savedLogs []string
|
|
}
|
|
|
|
func (s *SyslogTestActions) Connect() error {
|
|
return nil
|
|
}
|
|
|
|
func (s *SyslogTestActions) Info(writeMe string) {
|
|
log.Printf("FAKE SYSLOG LINE: %s\n", writeMe)
|
|
s.savedLogs = append(s.savedLogs, writeMe)
|
|
}
|
|
|
|
func (s *SyslogTestActions) GetLogs() []string {
|
|
return s.savedLogs
|
|
}
|
|
|
|
func connectFakeSyslog() *SyslogTestActions {
|
|
return new(SyslogTestActions)
|
|
}
|