π§ AWS Network Firewall Policy is not associated with a rule group - prod.logic.yamlπ’
- Contextual name: π§ prod.logic.yamlπ’
- ID:
/ce/ca/aws/network-firewall/policy-rule-group-association/prod.logic.yaml - Tags:
- π’ Logic test success
- π’ Logic with extracts
- π’ Logic with test data
Usesβ
- π AWS NetworkFirewall Firewall Policy
- π AWS NetworkFirewall Firewall Policy - object.extracts.yaml
- π§ͺ test-data.json
Test Results π’β
Generated at: 2026-02-10T22:33:06.172785144Z Open
| Result | Id | Condition Index | Condition Text | Runtime Error |
|---|---|---|---|---|
| π’ | test1 | βοΈ 99 | βοΈ isDisappeared(CA10A2__disappearanceTime__c) | βοΈ null |
| π’ | test2 | βοΈ 101 | βοΈ CA10A2__firewallPolicyStatus__c.delegatedTo(CA10A2__firewallPolicyStatus__c).isEmpty() | βοΈ null |
| π’ | test3 | βοΈ 199 | βοΈ extract('CA10A2__firewallPolicyStatus__c') != 'ACTIVE' | βοΈ null |
| π’ | test4 | βοΈ 299 | βοΈ CA10A2__AWS_NetworkFirewall_PolicyRuleGroupLinks__r.hasNo(COMPLIANT) | βοΈ null |
| π’ | test5 | βοΈ 399 | βοΈ CA10A2__AWS_NetworkFirewall_PolicyRuleGroupLinks__r.has(COMPLIANT) | βοΈ null |
Generation Bundleβ
| File | MD5 | |
|---|---|---|
| Open | /ce/ca/aws/network-firewall/policy-rule-group-association/policy.yaml | 68CBA2A130F1C8E3794C09403DC151A5 |
| Open | /ce/ca/aws/network-firewall/policy-rule-group-association/prod.logic.yaml | 61CC06D662444D19F9B9EAC8EA86260A |
| Open | /ce/ca/aws/network-firewall/policy-rule-group-association/test-data.json | 568BBA852ED7E377541EDCCC312E0D8D |
| Open | /types/CA10A2__CaAwsNetworkFirewallFirewallPolicy__c/object.extracts.yaml | 7D78149FCF8A2F3ABE66E6CFC4C9C395 |
Available Commandsβ
repo-manager policies generate FULL /ce/ca/aws/network-firewall/policy-rule-group-association/prod.logic.yaml
repo-manager policies generate DEBUG /ce/ca/aws/network-firewall/policy-rule-group-association/prod.logic.yaml
repo-manager policies generate CAPTURE_TEST_DATA /ce/ca/aws/network-firewall/policy-rule-group-association/prod.logic.yaml
repo-manager policies generate TESTS /ce/ca/aws/network-firewall/policy-rule-group-association/prod.logic.yaml
# Execute tests
repo-manager policies test /ce/ca/aws/network-firewall/policy-rule-group-association/prod.logic.yaml
Contentβ
---
inputType: "CA10A2__CaAwsNetworkFirewallFirewallPolicy__c"
importExtracts:
- file: "/types/CA10A2__CaAwsNetworkFirewallFirewallPolicy__c/object.extracts.yaml"
testData:
- file: "test-data.json"
conditions:
- status: "INAPPLICABLE"
currentStateMessage: "The network firewall policy is not active."
check:
NOT_EQUAL:
left:
EXTRACT: "CA10A2__firewallPolicyStatus__c"
right:
TEXT: "ACTIVE"
- status: "INCOMPLIANT"
currentStateMessage: "The network firewall policy has no stateful or stateless rule groups associated."
remediationMessage: "Associate at least one rule group with the firewall policy to define traffic filtering rules."
check:
RELATED_LIST_HAS_NO:
status: "COMPLIANT"
relationshipName: "CA10A2__AWS_NetworkFirewall_PolicyRuleGroupLinks__r"
- status: "COMPLIANT"
currentStateMessage: "The network firewall policy is associated with at least one rule group."
check:
RELATED_LIST_HAS:
status: "COMPLIANT"
relationshipName: "CA10A2__AWS_NetworkFirewall_PolicyRuleGroupLinks__r"
otherwise:
status: "UNDETERMINED"
currentStateMessage: "Unexpected values in the fields."
relatedLists:
- relationshipName: "CA10A2__AWS_NetworkFirewall_PolicyRuleGroupLinks__r"
conditions:
- status: "COMPLIANT"
currentStateMessage: "A rule group association exists."
check:
NOT_EMPTY_LOOKUP: "CA10A2__ruleGroup__r"
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "No rule group association exists."