Skip to main content

πŸ§ͺ test-data.json

  • Contextual name: πŸ§ͺ test-data.json
  • ID: /ce/ca/aws/iam/detach-aws-cloudshell-full-access-policy/test-data.json

Used In​

LogicPolicyFlags
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS IAM AWSCloudShellFullAccess Policy is attached 🟒🟒 x3

Content​

Open File

[
{
"expectedResult": {
"status": "DISAPPEARED",
"conditionIndex": "99",
"conditionText": "isDisappeared(CA10__disappearanceTime__c)",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-07-10T20:44:00Z"
},
"Id": "test1",
"CA10__disappearanceTime__c": "2024-07-10T03:39:54Z",
"CA10__name__c": "policyName1",
"CA10__AWS_IAM_Role_Policy_Attachments__r": [
{
"Id": "test1_1",
"CA10__disappearanceTime__c": "2024-07-09T21:50:34Z",
"CA10__role__c": "role1",
"CA10__roleArn__c": "arn:aws:iam::012345678910:role/roleName1",
"CA10__policy__c": "test1",
"CA10__role__r": {
"Id": "role1",
"CA10__disappearanceTime__c": "2024-07-09T21:48:35Z"
}
}
]
},
{
"expectedResult": {
"status": "INAPPLICABLE",
"conditionIndex": "199",
"conditionText": "extract('CA10__name__c') != 'AWSCloudShellFullAccess'",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-07-10T20:44:00Z"
},
"Id": "test2",
"CA10__disappearanceTime__c": null,
"CA10__name__c": "policyName2",
"CA10__AWS_IAM_Role_Policy_Attachments__r": [
{
"Id": "test2_1",
"CA10__disappearanceTime__c": null,
"CA10__role__c": "role2",
"CA10__roleArn__c": "arn:aws:iam::012345678910:role/roleName2",
"CA10__policy__c": "test2",
"CA10__role__r": {
"Id": "role2",
"CA10__disappearanceTime__c": null
}
}
]
},
{
"expectedResult": {
"status": "INCOMPLIANT",
"conditionIndex": "299",
"conditionText": "CA10__AWS_IAM_Role_Policy_Attachments__r.has(INCOMPLIANT)",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-07-10T20:44:00Z"
},
"Id": "test3",
"CA10__disappearanceTime__c": null,
"CA10__name__c": "AWSCloudShellFullAccess",
"CA10__AWS_IAM_Role_Policy_Attachments__r": [
{
"Id": "test3_1",
"CA10__disappearanceTime__c": null,
"CA10__role__c": "role3",
"CA10__roleArn__c": "arn:aws:iam::012345678910:role/roleName3",
"CA10__policy__c": "test3",
"CA10__role__r": {
"Id": "role3",
"CA10__disappearanceTime__c": null
}
}
]
},
{
"expectedResult": {
"status": "COMPLIANT",
"conditionIndex": "300",
"conditionText": "otherwise",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-07-10T20:44:00Z"
},
"Id": "test4",
"CA10__disappearanceTime__c": null,
"CA10__name__c": "AWSCloudShellFullAccess",
"CA10__AWS_IAM_Role_Policy_Attachments__r": [
{
"Id": "test4_1",
"CA10__disappearanceTime__c": null,
"CA10__role__c": "role4",
"CA10__roleArn__c": "arn:aws:iam::012345678910:role/roleName4",
"CA10__policy__c": "test4",
"CA10__role__r": {
"Id": "role4",
"CA10__disappearanceTime__c": "2024-07-10T20:44:00Z"
}
}
]
},
{
"expectedResult": {
"status": "COMPLIANT",
"conditionIndex": "300",
"conditionText": "otherwise",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-07-10T20:44:00Z"
},
"Id": "test5",
"CA10__disappearanceTime__c": null,
"CA10__name__c": "AWSCloudShellFullAccess",
"CA10__AWS_IAM_Role_Policy_Attachments__r": [
{
"Id": "test5_1",
"CA10__disappearanceTime__c": "2024-07-10T20:44:00Z",
"CA10__role__c": null,
"CA10__roleArn__c": "arn:aws:iam::012345678910:role/roleName5",
"CA10__policy__c": "test5",
"CA10__role__r": {
"Id": null,
"CA10__disappearanceTime__c": "2024-07-10T20:44:00Z"
}
}
]
},
{
"expectedResult": {
"status": "COMPLIANT",
"conditionIndex": "300",
"conditionText": "otherwise",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-07-10T20:44:00Z"
},
"Id": "test6",
"CA10__disappearanceTime__c": null,
"CA10__name__c": "AWSCloudShellFullAccess",
"CA10__AWS_IAM_Role_Policy_Attachments__r": []
}
]