Skip to main content

πŸ§ͺ test-data.json

  • Contextual name: πŸ§ͺ test-data.json
  • ID: /ce/ca/azure/key-vault/role-based-access-control/test-data.json

Used In​

LogicPolicyFlags
🧠 prod.logic.yaml πŸŸ’πŸ“ Azure Key Vault Role Based Access Control is not enabled 🟒🟒 x3

Content​

Open File

[
{
"expectedResult": {
"status": "DISAPPEARED",
"conditionIndex": "99",
"conditionText": "isDisappeared(CA10__disappearanceTime__c)",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-06-27T20:33:04Z"
},
"Id": "test1",
"CA10__disappearanceTime__c": "2024-06-27T20:33:04Z",
"CA10__rbacAuthorization__c": "Disabled"
},
{
"expectedResult": {
"status": "INCOMPLIANT",
"conditionIndex": "199",
"conditionText": "extract('CA10__rbacAuthorization__c') == 'Disabled'",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-06-27T20:33:04Z"
},
"Id": "test2",
"CA10__disappearanceTime__c": null,
"CA10__rbacAuthorization__c": "Disabled"
},
{
"expectedResult": {
"status": "COMPLIANT",
"conditionIndex": "299",
"conditionText": "extract('CA10__rbacAuthorization__c') == 'Enabled'",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-06-27T20:33:04Z"
},
"Id": "test3",
"CA10__disappearanceTime__c": null,
"CA10__rbacAuthorization__c": "Enabled"
}
]