--- policy: /ce/ca/oracle/iam/administrator-user-has-active-api-key logic: /ce/ca/oracle/iam/administrator-user-has-active-api-key/prod.logic.yaml executionTime: 2026-05-02T12:07:24.203056627Z generationMs: 91 executionMs: 2442 rows: - id: test1 match: true status: expected: INAPPLICABLE actual: INAPPLICABLE conditionIndex: expected: 199 actual: 199 conditionText: expected: extract('CA10O1__lifecycleState__c') != 'ACTIVE' actual: extract('CA10O1__lifecycleState__c') != 'ACTIVE' runtimeError: {} - id: test2 match: true status: expected: INAPPLICABLE actual: INAPPLICABLE conditionIndex: expected: 299 actual: 299 conditionText: expected: CA10O1__Oracle_IAM_User_Group_Memberships__r.hasNo(COMPLIANT) actual: CA10O1__Oracle_IAM_User_Group_Memberships__r.hasNo(COMPLIANT) runtimeError: {} - id: test3 match: true status: expected: INCOMPLIANT actual: INCOMPLIANT conditionIndex: expected: 399 actual: 399 conditionText: expected: CA10O1__Oracle_IAM_User_API_Keys__r.has(COMPLIANT) actual: CA10O1__Oracle_IAM_User_API_Keys__r.has(COMPLIANT) runtimeError: {} - id: test4 match: true status: expected: COMPLIANT actual: COMPLIANT conditionIndex: expected: 400 actual: 400 conditionText: expected: otherwise actual: otherwise runtimeError: {} usedFiles: - path: /ce/ca/oracle/iam/administrator-user-has-active-api-key/policy.yaml md5Hash: 37A6255383A17036A2BA357BB0CFD54D content: "---\nnames:\n full: \"Oracle IAM Administrator User has an active API\ \ key\"\n contextual: \"IAM Administrator User has an active API key\"\ndescription:\ \ >\n OCI tenancy administrator users should not have active API keys. Long-term\ \ API \n credentials on privileged users increase the risk of broad unauthorized\ \ access.\ntype: \"COMPLIANCE_POLICY\"\ncategories:\n - \"SECURITY\"\nframeworkMappings:\n\ \ - \"/frameworks/cis-oracle-v3.1.0/01/12\"\n - \"/frameworks/cloudaware/identity-and-access-governance/credential-lifecycle-management\"\ \n" - path: /ce/ca/oracle/iam/administrator-user-has-active-api-key/prod.logic.yaml md5Hash: B292F56772A894F0F8BBAD302E042675 content: | --- inputType: "CA10O1__CaOracleIamUser__c" testData: - file: test-data.json importExtracts: - file: /types/CA10O1__CaOracleIamUser__c/object.extracts.yaml conditions: - status: "INAPPLICABLE" currentStateMessage: "This Oracle IAM user is not active." check: NOT_EQUAL: left: EXTRACT: "CA10O1__lifecycleState__c" right: TEXT: "ACTIVE" - status: "INAPPLICABLE" currentStateMessage: "This active Oracle IAM user is not a member of the tenancy Administrators group." check: RELATED_LIST_HAS_NO: status: "COMPLIANT" relationshipName: "CA10O1__Oracle_IAM_User_Group_Memberships__r" - status: "INCOMPLIANT" currentStateMessage: "This active tenancy administrator user has an active API key." remediationMessage: "Delete active API keys from this tenancy administrator user, or move required automation to a least-privileged identity." check: RELATED_LIST_HAS: status: "COMPLIANT" relationshipName: "CA10O1__Oracle_IAM_User_API_Keys__r" otherwise: status: "COMPLIANT" currentStateMessage: "This active tenancy administrator user does not have active API keys." relatedLists: - relationshipName: "CA10O1__Oracle_IAM_User_Group_Memberships__r" importExtracts: - file: /types/CA10O1__CaOracleIamGroup__c/object.extracts.yaml conditions: - status: "COMPLIANT" currentStateMessage: "This group membership grants membership in the tenancy Administrators group." check: IS_EQUAL: left: EXTRACT: "CA10O1__group__r.Name" right: TEXT: "Administrators" otherwise: status: "INAPPLICABLE" currentStateMessage: "This group membership does not grant membership in the tenancy Administrators group." - relationshipName: "CA10O1__Oracle_IAM_User_API_Keys__r" importExtracts: - file: /types/CA10O1__CaOracleIamUserApiKey__c/object.extracts.yaml conditions: - status: "COMPLIANT" currentStateMessage: "This Oracle IAM API key is active." check: IS_EQUAL: left: EXTRACT: "CA10O1__lifecycleState__c" right: TEXT: "ACTIVE" otherwise: status: "INAPPLICABLE" currentStateMessage: "This Oracle IAM API key is not active." - path: /ce/ca/oracle/iam/administrator-user-has-active-api-key/test-data.json md5Hash: 163E9B89DAAC0B9A0AF9CB18BC047B87 content: |- [ { "expectedResult": { "status": "INAPPLICABLE", "conditionIndex": "199", "conditionText": "extract('CA10O1__lifecycleState__c') != 'ACTIVE'", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "test1", "CA10O1__disappearanceTime__c": null, "CA10O1__lifecycleState__c": "DELETED", "CA10O1__Oracle_IAM_User_Group_Memberships__r": [ { "Id": "test1_1", "CA10O1__disappearanceTime__c": null, "CA10O1__user__c": "test1", "CA10O1__group__c": "test1_2", "CA10O1__groupOcid__c": "ocid1.group.oc1..administrators", "CA10O1__group__r": { "Id": "test1_2", "CA10O1__disappearanceTime__c": null, "Name": "Administrators" } } ], "CA10O1__Oracle_IAM_User_API_Keys__r": [ { "Id": "test1_3", "CA10O1__disappearanceTime__c": null, "CA10O1__user__c": "test1", "CA10O1__lifecycleState__c": "ACTIVE" } ] }, { "expectedResult": { "status": "INAPPLICABLE", "conditionIndex": "299", "conditionText": "CA10O1__Oracle_IAM_User_Group_Memberships__r.hasNo(COMPLIANT)", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "test2", "CA10O1__disappearanceTime__c": null, "CA10O1__lifecycleState__c": "ACTIVE", "CA10O1__Oracle_IAM_User_Group_Memberships__r": [ { "Id": "test2_1", "CA10O1__disappearanceTime__c": null, "CA10O1__user__c": "test2", "CA10O1__group__c": "test2_2", "CA10O1__groupOcid__c": "ocid1.group.oc1..developers", "CA10O1__group__r": { "Id": "test2_2", "CA10O1__disappearanceTime__c": null, "Name": "Developers" } } ], "CA10O1__Oracle_IAM_User_API_Keys__r": [ { "Id": "test2_3", "CA10O1__disappearanceTime__c": null, "CA10O1__user__c": "test2", "CA10O1__lifecycleState__c": "ACTIVE" } ] }, { "expectedResult": { "status": "INCOMPLIANT", "conditionIndex": "399", "conditionText": "CA10O1__Oracle_IAM_User_API_Keys__r.has(COMPLIANT)", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "test3", "CA10O1__disappearanceTime__c": null, "CA10O1__lifecycleState__c": "ACTIVE", "CA10O1__Oracle_IAM_User_Group_Memberships__r": [ { "Id": "test3_1", "CA10O1__disappearanceTime__c": null, "CA10O1__user__c": "test3", "CA10O1__group__c": "test3_2", "CA10O1__groupOcid__c": "ocid1.group.oc1..administrators", "CA10O1__group__r": { "Id": "test3_2", "CA10O1__disappearanceTime__c": null, "Name": "Administrators" } } ], "CA10O1__Oracle_IAM_User_API_Keys__r": [ { "Id": "test3_3", "CA10O1__disappearanceTime__c": null, "CA10O1__user__c": "test3", "CA10O1__lifecycleState__c": "ACTIVE" } ] }, { "expectedResult": { "status": "COMPLIANT", "conditionIndex": "400", "conditionText": "otherwise", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "test4", "CA10O1__disappearanceTime__c": null, "CA10O1__lifecycleState__c": "ACTIVE", "CA10O1__Oracle_IAM_User_Group_Memberships__r": [ { "Id": "test4_1", "CA10O1__disappearanceTime__c": null, "CA10O1__user__c": "test4", "CA10O1__group__c": "test4_2", "CA10O1__groupOcid__c": "ocid1.group.oc1..administrators", "CA10O1__group__r": { "Id": "test4_2", "CA10O1__disappearanceTime__c": null, "Name": "Administrators" } } ], "CA10O1__Oracle_IAM_User_API_Keys__r": [ { "Id": "test4_3", "CA10O1__disappearanceTime__c": null, "CA10O1__user__c": "test4", "CA10O1__lifecycleState__c": "INACTIVE" } ] } ] - path: /types/CA10O1__CaOracleIamGroup__c/object.extracts.yaml md5Hash: CC9779AF5A220F1133C93E0D6734D8DA content: | --- extracts: - name: "Name" value: FIELD: path: "Name" undeterminedIf: isEmpty: "Oracle IAM group name should not be empty." - path: /types/CA10O1__CaOracleIamUserApiKey__c/object.extracts.yaml md5Hash: AA56F5592EB714844CCA7BC8D8BA5839 content: | --- extracts: # Not nullable. - name: "CA10O1__lifecycleState__c" value: FIELD: path: "CA10O1__lifecycleState__c" # Not nullable. - name: "CA10O1__timeCreated__c" value: FIELD: path: "CA10O1__timeCreated__c" - path: /types/CA10O1__CaOracleIamUser__c/object.extracts.yaml md5Hash: 47F91526ED7905B2BD0F0545EF1BCEAA content: | --- extracts: # Not nullable. - name: "CA10O1__lifecycleState__c" value: FIELD: path: "CA10O1__lifecycleState__c" undeterminedIf: isEmpty: "User lifecycle state should not be empty." # Values: Activated, Deactivated. Not nullable. - name: "CA10O1__mfaStatus__c" value: FIELD: path: "CA10O1__mfaStatus__c" undeterminedIf: isEmpty: "User MFA status should not be empty." script: |- CREATE TEMP FUNCTION mock_ExpectedResult() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "Id" : "test1", "expectedResult" : { "status" : "INAPPLICABLE", "conditionIndex" : "199", "conditionText" : "extract('CA10O1__lifecycleState__c') != 'ACTIVE'", "runtimeError" : null } }, { "Id" : "test2", "expectedResult" : { "status" : "INAPPLICABLE", "conditionIndex" : "299", "conditionText" : "CA10O1__Oracle_IAM_User_Group_Memberships__r.hasNo(COMPLIANT)", "runtimeError" : null } }, { "Id" : "test3", "expectedResult" : { "status" : "INCOMPLIANT", "conditionIndex" : "399", "conditionText" : "CA10O1__Oracle_IAM_User_API_Keys__r.has(COMPLIANT)", "runtimeError" : null } }, { "Id" : "test4", "expectedResult" : { "status" : "COMPLIANT", "conditionIndex" : "400", "conditionText" : "otherwise", "runtimeError" : null } } ]; """; CREATE TEMP FUNCTION mock_CA10O1__CaOracleIamUser__c() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__lifecycleState__c" : "DELETED", "Id" : "test1" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__lifecycleState__c" : "ACTIVE", "Id" : "test2" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__lifecycleState__c" : "ACTIVE", "Id" : "test3" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__lifecycleState__c" : "ACTIVE", "Id" : "test4" } ]; """; CREATE TEMP FUNCTION mock_CA10O1__CaOracleIamUserGroupMembership__c() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__group__c" : "test1_2", "CA10O1__groupOcid__c" : "ocid1.group.oc1..administrators", "CA10O1__user__c" : "test1", "Id" : "test1_1" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__group__c" : "test2_2", "CA10O1__groupOcid__c" : "ocid1.group.oc1..developers", "CA10O1__user__c" : "test2", "Id" : "test2_1" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__group__c" : "test3_2", "CA10O1__groupOcid__c" : "ocid1.group.oc1..administrators", "CA10O1__user__c" : "test3", "Id" : "test3_1" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__group__c" : "test4_2", "CA10O1__groupOcid__c" : "ocid1.group.oc1..administrators", "CA10O1__user__c" : "test4", "Id" : "test4_1" } ]; """; CREATE TEMP FUNCTION mock_CA10O1__CaOracleIamGroup__c() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Id" : "test1_2", "Name" : "Administrators" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Id" : "test2_2", "Name" : "Developers" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Id" : "test3_2", "Name" : "Administrators" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Id" : "test4_2", "Name" : "Administrators" } ]; """; CREATE TEMP FUNCTION mock_CA10O1__CaOracleIamUserApiKey__c() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__lifecycleState__c" : "ACTIVE", "CA10O1__user__c" : "test1", "Id" : "test1_3" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__lifecycleState__c" : "ACTIVE", "CA10O1__user__c" : "test2", "Id" : "test2_3" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__lifecycleState__c" : "ACTIVE", "CA10O1__user__c" : "test3", "Id" : "test3_3" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__lifecycleState__c" : "INACTIVE", "CA10O1__user__c" : "test4", "Id" : "test4_3" } ]; """; CREATE TEMP FUNCTION process_CA10O1__CaOracleIamUser__c( obj STRUCT< CA10O1__disappearanceTime__c TIMESTAMP, CA10O1__lifecycleState__c STRING, Id STRING, CA10O1__Oracle_IAM_User_Group_Memberships__r ARRAY, result STRUCT >>, CA10O1__Oracle_IAM_User_API_Keys__r ARRAY >> >, snapshotTime TIMESTAMP ) RETURNS STRUCT DETERMINISTIC LANGUAGE js AS r""" var TextLib = new function () { this.normalize = function(arg) { return arg == null ? '' : arg.replace(/\s+/g, ' ').trim().toLowerCase(); }; this.isEmpty = function(arg) { return this.normalize(arg) == ''; }; this.isNotEmpty = function(arg) { return this.normalize(arg) != ''; }; this.equal = function(left, right) { return this.normalize(left) == this.normalize(right); }; this.notEqual = function(left, right) { return this.normalize(left) != this.normalize(right); }; this.startsWith = function(arg, substring) { return this.normalize(arg).startsWith(this.normalize(substring)); }; this.endsWith = function(arg, substring) { return this.normalize(arg).endsWith(this.normalize(substring)); }; this.contains = function(arg, substring) { return this.normalize(arg).includes(this.normalize(substring)); }; this.containsAll = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.every(sub => normalizedArg.includes(this.normalize(sub))); }; this.containsAny = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.some(sub => normalizedArg.includes(this.normalize(sub))); }; }(); var references1 = []; // condition[0], conditionIndex:[0..99] references1.push('Deleted From Oracle [CA10O1__disappearanceTime__c]: ' + obj.CA10O1__disappearanceTime__c); if (obj.CA10O1__disappearanceTime__c != null) { return {status: 'DISAPPEARED', conditionIndex: 99, conditionText: "isDisappeared(CA10O1__disappearanceTime__c)", currentStateMessage: "Object is deleted in the source", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } // condition[1], conditionIndex:[100..199] function extract3() { if (!this.out) { this.out = obj.CA10O1__lifecycleState__c; } return this.out; }; references1.push('Lifecycle State [obj.CA10O1__lifecycleState__c]: ' + obj.CA10O1__lifecycleState__c); if (TextLib.notEqual(extract3.call(extract3), 'ACTIVE')) { return {status: 'INAPPLICABLE', conditionIndex: 199, conditionText: "extract('CA10O1__lifecycleState__c') != 'ACTIVE'", currentStateMessage: "This Oracle IAM user is not active.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } var count_CA10O1__Oracle_IAM_User_Group_Memberships__r_COMPLIANT5 = 0; if (obj.CA10O1__Oracle_IAM_User_Group_Memberships__r != null) { for (var i6 = 0; i6 < obj.CA10O1__Oracle_IAM_User_Group_Memberships__r.length; i6++) { if (typeof(obj.CA10O1__Oracle_IAM_User_Group_Memberships__r[i6].status) !== 'undefined') { if (obj.CA10O1__Oracle_IAM_User_Group_Memberships__r[i6].status == 'COMPLIANT') { count_CA10O1__Oracle_IAM_User_Group_Memberships__r_COMPLIANT5 += obj.CA10O1__Oracle_IAM_User_Group_Memberships__r[i6].count; } } else { if (obj.CA10O1__Oracle_IAM_User_Group_Memberships__r[i6].result.status == 'COMPLIANT') { count_CA10O1__Oracle_IAM_User_Group_Memberships__r_COMPLIANT5 += 1; } } } } // condition[2], conditionIndex:[200..299] references1.push('Related list [CA10O1__Oracle_IAM_User_Group_Memberships__r] ' + (count_CA10O1__Oracle_IAM_User_Group_Memberships__r_COMPLIANT5 == 0 ? 'does not have' : 'has') + ' objects in COMPLIANT status'); if (count_CA10O1__Oracle_IAM_User_Group_Memberships__r_COMPLIANT5 == 0) { return {status: 'INAPPLICABLE', conditionIndex: 299, conditionText: "CA10O1__Oracle_IAM_User_Group_Memberships__r.hasNo(COMPLIANT)", currentStateMessage: "This active Oracle IAM user is not a member of the tenancy Administrators group.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } var count_CA10O1__Oracle_IAM_User_API_Keys__r_COMPLIANT7 = 0; if (obj.CA10O1__Oracle_IAM_User_API_Keys__r != null) { for (var i8 = 0; i8 < obj.CA10O1__Oracle_IAM_User_API_Keys__r.length; i8++) { if (typeof(obj.CA10O1__Oracle_IAM_User_API_Keys__r[i8].status) !== 'undefined') { if (obj.CA10O1__Oracle_IAM_User_API_Keys__r[i8].status == 'COMPLIANT') { count_CA10O1__Oracle_IAM_User_API_Keys__r_COMPLIANT7 += obj.CA10O1__Oracle_IAM_User_API_Keys__r[i8].count; } } else { if (obj.CA10O1__Oracle_IAM_User_API_Keys__r[i8].result.status == 'COMPLIANT') { count_CA10O1__Oracle_IAM_User_API_Keys__r_COMPLIANT7 += 1; } } } } // condition[3], conditionIndex:[300..399] references1.push('Related list [CA10O1__Oracle_IAM_User_API_Keys__r] ' + (count_CA10O1__Oracle_IAM_User_API_Keys__r_COMPLIANT7 > 0 ? 'has' : 'does not have') + ' objects in COMPLIANT status'); if (count_CA10O1__Oracle_IAM_User_API_Keys__r_COMPLIANT7 > 0) { return {status: 'INCOMPLIANT', conditionIndex: 399, conditionText: "CA10O1__Oracle_IAM_User_API_Keys__r.has(COMPLIANT)", currentStateMessage: "This active tenancy administrator user has an active API key.", currentStateReferences: references1.join('\n'), remediation: "Delete active API keys from this tenancy administrator user, or move required automation to a least-privileged identity.", runtimeError: null}; } return {status: 'COMPLIANT', conditionIndex: 400, conditionText: "otherwise", currentStateMessage: "This active tenancy administrator user does not have active API keys.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; """; CREATE TEMP FUNCTION process_CA10O1__Oracle_IAM_User_Group_Memberships__r( obj STRUCT< CA10O1__disappearanceTime__c TIMESTAMP, CA10O1__group__c STRING, CA10O1__groupOcid__c STRING, CA10O1__user__c STRING, Id STRING, CA10O1__group__r STRUCT< Id STRING, CA10O1__disappearanceTime__c TIMESTAMP, Name STRING > >, snapshotTime TIMESTAMP ) RETURNS STRUCT DETERMINISTIC LANGUAGE js AS r""" var TextLib = new function () { this.normalize = function(arg) { return arg == null ? '' : arg.replace(/\s+/g, ' ').trim().toLowerCase(); }; this.isEmpty = function(arg) { return this.normalize(arg) == ''; }; this.isNotEmpty = function(arg) { return this.normalize(arg) != ''; }; this.equal = function(left, right) { return this.normalize(left) == this.normalize(right); }; this.notEqual = function(left, right) { return this.normalize(left) != this.normalize(right); }; this.startsWith = function(arg, substring) { return this.normalize(arg).startsWith(this.normalize(substring)); }; this.endsWith = function(arg, substring) { return this.normalize(arg).endsWith(this.normalize(substring)); }; this.contains = function(arg, substring) { return this.normalize(arg).includes(this.normalize(substring)); }; this.containsAll = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.every(sub => normalizedArg.includes(this.normalize(sub))); }; this.containsAny = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.some(sub => normalizedArg.includes(this.normalize(sub))); }; }(); var references1 = []; // condition[0], conditionIndex:[0..99] references1.push('Deleted From Oracle [CA10O1__disappearanceTime__c]: ' + obj.CA10O1__disappearanceTime__c); if (obj.CA10O1__disappearanceTime__c != null) { return {status: 'DISAPPEARED', conditionIndex: 99, conditionText: "isDisappeared(CA10O1__disappearanceTime__c)", currentStateMessage: "Object is deleted in the source", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } // condition[1], conditionIndex:[100..199] function extractChecked2() { if (TextLib.isEmpty(obj.CA10O1__groupOcid__c)) { throw new Error("UNDETERMINED condition:101", {cause: {status: 'UNDETERMINED', conditionIndex: 101, conditionText: "extractCheck(obj.CA10O1__groupOcid__c)", currentStateMessage: "Related object via CA10O1__groupOcid__c has empty ID", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } if (TextLib.isEmpty(obj.CA10O1__group__c)) { throw new Error("UNDETERMINED condition:102", {cause: {status: 'UNDETERMINED', conditionIndex: 102, conditionText: "extractCheck(obj.CA10O1__group__c)", currentStateMessage: "Related object via CA10O1__group__c is not present", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } if (obj.CA10O1__group__r.CA10O1__disappearanceTime__c != null) { throw new Error("UNDETERMINED condition:103", {cause: {status: 'UNDETERMINED', conditionIndex: 103, conditionText: "extractCheck(obj.CA10O1__group__r.CA10O1__disappearanceTime__c)", currentStateMessage: "Related object via CA10O1__group__c is present, but deleted in the source", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } return extract3.call(extract3); } function fieldChecked4() { if (TextLib.isEmpty(obj.CA10O1__group__r.Name)) { throw new Error("UNDETERMINED condition:104", {cause: {status: 'UNDETERMINED', conditionIndex: 104, conditionText: "Name.isEmpty()", currentStateMessage: "Oracle IAM group name should not be empty.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } return obj.CA10O1__group__r.Name; } function extract3() { if (!this.out) { this.out = fieldChecked4(); } return this.out; }; references1.push('Name [obj.CA10O1__group__r.Name]: ' + obj.CA10O1__group__r.Name); try { if (TextLib.equal(extractChecked2(), 'Administrators')) { return {status: 'COMPLIANT', conditionIndex: 199, conditionText: "extract('CA10O1__group__r.Name') == 'Administrators'", currentStateMessage: "This group membership grants membership in the tenancy Administrators group.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } } catch (err) { if (err.cause && err.cause.status) { return err.cause; } else { throw err; } } return {status: 'INAPPLICABLE', conditionIndex: 200, conditionText: "otherwise", currentStateMessage: "This group membership does not grant membership in the tenancy Administrators group.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; """; CREATE TEMP FUNCTION process_CA10O1__Oracle_IAM_User_API_Keys__r( obj STRUCT< CA10O1__disappearanceTime__c TIMESTAMP, CA10O1__lifecycleState__c STRING, CA10O1__user__c STRING, Id STRING >, snapshotTime TIMESTAMP ) RETURNS STRUCT DETERMINISTIC LANGUAGE js AS r""" var TextLib = new function () { this.normalize = function(arg) { return arg == null ? '' : arg.replace(/\s+/g, ' ').trim().toLowerCase(); }; this.isEmpty = function(arg) { return this.normalize(arg) == ''; }; this.isNotEmpty = function(arg) { return this.normalize(arg) != ''; }; this.equal = function(left, right) { return this.normalize(left) == this.normalize(right); }; this.notEqual = function(left, right) { return this.normalize(left) != this.normalize(right); }; this.startsWith = function(arg, substring) { return this.normalize(arg).startsWith(this.normalize(substring)); }; this.endsWith = function(arg, substring) { return this.normalize(arg).endsWith(this.normalize(substring)); }; this.contains = function(arg, substring) { return this.normalize(arg).includes(this.normalize(substring)); }; this.containsAll = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.every(sub => normalizedArg.includes(this.normalize(sub))); }; this.containsAny = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.some(sub => normalizedArg.includes(this.normalize(sub))); }; }(); var references1 = []; // condition[0], conditionIndex:[0..99] references1.push('Deleted From Oracle [CA10O1__disappearanceTime__c]: ' + obj.CA10O1__disappearanceTime__c); if (obj.CA10O1__disappearanceTime__c != null) { return {status: 'DISAPPEARED', conditionIndex: 99, conditionText: "isDisappeared(CA10O1__disappearanceTime__c)", currentStateMessage: "Object is deleted in the source", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } // condition[1], conditionIndex:[100..199] function extract3() { if (!this.out) { this.out = obj.CA10O1__lifecycleState__c; } return this.out; }; references1.push('Lifecycle State [obj.CA10O1__lifecycleState__c]: ' + obj.CA10O1__lifecycleState__c); if (TextLib.equal(extract3.call(extract3), 'ACTIVE')) { return {status: 'COMPLIANT', conditionIndex: 199, conditionText: "extract('CA10O1__lifecycleState__c') == 'ACTIVE'", currentStateMessage: "This Oracle IAM API key is active.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } return {status: 'INAPPLICABLE', conditionIndex: 200, conditionText: "otherwise", currentStateMessage: "This Oracle IAM API key is not active.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; """; SELECT expectedResult.Id as Id, IF ( IFNULL(expectedResult.expectedResult.status, '') = IFNULL(sObject.result.status, '') AND IFNULL(expectedResult.expectedResult.conditionIndex, -1) = IFNULL(sObject.result.conditionIndex, -1) AND IFNULL(expectedResult.expectedResult.conditionText, '') = IFNULL(sObject.result.conditionText, '') AND IFNULL(expectedResult.expectedResult.runtimeError, '') = IFNULL(sObject.result.runtimeError, ''), "MATCH", "FAIL" ) as match, expectedResult.expectedResult.status as expectedStatus, sObject.result.status as actualStatus, expectedResult.expectedResult.conditionIndex as expectedConditionIndex, sObject.result.conditionIndex as actualConditionIndex, expectedResult.expectedResult.conditionText as expectedConditionText, sObject.result.conditionText as actualConditionText, expectedResult.expectedResult.runtimeError as expectedRuntimeError, sObject.result.runtimeError as actualRuntimeError FROM UNNEST(mock_ExpectedResult()) expectedResult LEFT JOIN ( SELECT sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__lifecycleState__c AS CA10O1__lifecycleState__c, sObject.Id AS Id, `CA10O1__Oracle_IAM_User_Group_Memberships__r`.arr AS CA10O1__Oracle_IAM_User_Group_Memberships__r, `CA10O1__Oracle_IAM_User_API_Keys__r`.arr AS CA10O1__Oracle_IAM_User_API_Keys__r, process_CA10O1__CaOracleIamUser__c( STRUCT( sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__lifecycleState__c AS CA10O1__lifecycleState__c, sObject.Id AS Id, `CA10O1__Oracle_IAM_User_Group_Memberships__r`.arr AS CA10O1__Oracle_IAM_User_Group_Memberships__r, `CA10O1__Oracle_IAM_User_API_Keys__r`.arr AS CA10O1__Oracle_IAM_User_API_Keys__r ), sObject.context.snapshotTime ) as result FROM UNNEST(mock_CA10O1__CaOracleIamUser__c()) AS sObject LEFT JOIN ( SELECT sObject.CA10O1__user__c, ARRAY_AGG( STRUCT( sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__group__c AS CA10O1__group__c, sObject.CA10O1__groupOcid__c AS CA10O1__groupOcid__c, sObject.CA10O1__user__c AS CA10O1__user__c, sObject.Id AS Id, STRUCT ( `CA10O1__group__r`.Id AS Id, `CA10O1__group__r`.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, `CA10O1__group__r`.Name AS Name ) AS CA10O1__group__r, process_CA10O1__Oracle_IAM_User_Group_Memberships__r( STRUCT( sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__group__c AS CA10O1__group__c, sObject.CA10O1__groupOcid__c AS CA10O1__groupOcid__c, sObject.CA10O1__user__c AS CA10O1__user__c, sObject.Id AS Id, STRUCT ( `CA10O1__group__r`.Id AS Id, `CA10O1__group__r`.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, `CA10O1__group__r`.Name AS Name ) AS CA10O1__group__r ), sObject.context.snapshotTime ) as result ) ) AS arr FROM UNNEST(mock_CA10O1__CaOracleIamUserGroupMembership__c()) AS sObject LEFT JOIN UNNEST(mock_CA10O1__CaOracleIamGroup__c()) AS `CA10O1__group__r` ON sObject.CA10O1__group__c = `CA10O1__group__r`.Id GROUP BY sObject.CA10O1__user__c ) AS `CA10O1__Oracle_IAM_User_Group_Memberships__r` ON sObject.Id = `CA10O1__Oracle_IAM_User_Group_Memberships__r`.CA10O1__user__c LEFT JOIN ( SELECT sObject.CA10O1__user__c, ARRAY_AGG( STRUCT( sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__lifecycleState__c AS CA10O1__lifecycleState__c, sObject.CA10O1__user__c AS CA10O1__user__c, sObject.Id AS Id, process_CA10O1__Oracle_IAM_User_API_Keys__r( STRUCT( sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__lifecycleState__c AS CA10O1__lifecycleState__c, sObject.CA10O1__user__c AS CA10O1__user__c, sObject.Id AS Id ), sObject.context.snapshotTime ) as result ) ) AS arr FROM UNNEST(mock_CA10O1__CaOracleIamUserApiKey__c()) AS sObject GROUP BY sObject.CA10O1__user__c ) AS `CA10O1__Oracle_IAM_User_API_Keys__r` ON sObject.Id = `CA10O1__Oracle_IAM_User_API_Keys__r`.CA10O1__user__c ) sObject ON sObject.Id = expectedResult.Id;