diff --git a/.github/workflows/tests-functional.yml b/.github/workflows/tests-functional.yml index f90e0fa60..2ce749aac 100644 --- a/.github/workflows/tests-functional.yml +++ b/.github/workflows/tests-functional.yml @@ -1,4 +1,4 @@ -name: Functional tests +name: functional-tests concurrency: group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }} @@ -8,23 +8,27 @@ on: workflow_dispatch: pull_request: paths: + - '.github/workflows/tests-functional.yml' - 'src/**' - 'tests/functional/**' + - 'tests/resources/mockoon/**' jobs: - AWS_tests: + functional-tests-with-robot: runs-on: ubuntu-22.04 steps: - uses: actions/checkout@v3 - - - name: Use Node.js + - name: Install Node.js uses: actions/setup-node@v2 with: node-version: "16.x" - name: Install Mockoon CLI - run: npm install -D @mockoon/cli + run: npm install -g -D @mockoon/cli + + - name: Install libs + run: sudo apt-get install libcurl4-openssl-dev - name: Install perl dependencies uses: shogo82148/actions-setup-perl@v1 @@ -35,40 +39,31 @@ jobs: DateTime Digest::MD5 Encode + ExtUtils::PkgConfig HTTP::ProxyPAC IO::Socket::SSL JSON::XS LWP::Protocol::https LWP::UserAgent MIME::Base64 + Net::Curl::Easy Paws POSIX Storable URI URI::Encode - - name: Run Mockoon CLI - run: npx mockoon-cli start --data tests/resources/mockoon/cloud-aws-cloudtrail.json --port 3000 + - name: Install Python + uses: actions/setup-python@v4 + with: + python-version: '3.10' - - name: Run plugin + - name: Install Robot Framework + run: pip3 install robotframework + shell: bash + + - name: Run Robot Framework tests run: | - sudo chmod -R +x tests/functional/ sudo mkdir -p /var/lib/centreon/centplugins/ sudo chmod 777 /var/lib/centreon/centplugins/ - TESTS="$(tests/functional/cloud/aws/cloudtrail/checktrailstatus.sh)" - echo "tests=$(echo $TESTS)" >> $GITHUB_OUTPUT - if [[ $TESTS = "OK:"* ]]; then - echo "OK" - else - echo $TESTS - exit 1 - fi - TESTS="$(tests/functional/cloud/aws/cloudtrail/countevents.sh)" - echo "tests=$(echo $TESTS)" >> $GITHUB_OUTPUT - if [[ $TESTS = "OK:"* ]]; then - echo "OK" - else - echo $TESTS - exit 1 - fi - shell: bash \ No newline at end of file + robot tests/functional/ diff --git a/src/cloud/aws/cloudtrail/mode/countevents.pm b/src/cloud/aws/cloudtrail/mode/countevents.pm index bb9891348..b09fae031 100644 --- a/src/cloud/aws/cloudtrail/mode/countevents.pm +++ b/src/cloud/aws/cloudtrail/mode/countevents.pm @@ -68,8 +68,8 @@ sub run { if (length($self->{option_results}->{event_type}) || length($self->{option_results}->{error_message})) { $count = 0; foreach my $event (@{$self->{events}}) { - if ((defined($self->{option_results}->{event_type}) && length($self->{option_results}->{event_type}) && ($event->{eventType} eq $self->{option_results}->{event_type})) - || (defined($self->{option_results}->{error_message}) && length($self->{option_results}->{error_message}) && ($event->{errorMessage} =~ $self->{option_results}->{error_message}))) { + if ((length($self->{option_results}->{event_type}) && ($event->{eventType} eq $self->{option_results}->{event_type})) + || (length($self->{option_results}->{error_message}) && length($event->{errorMessage}) && $event->{errorMessage} =~ $self->{option_results}->{error_message})) { $count++; } } diff --git a/tests/functional/cloud-aws-cloudtrail.robot b/tests/functional/cloud-aws-cloudtrail.robot new file mode 100644 index 000000000..6f0352f86 --- /dev/null +++ b/tests/functional/cloud-aws-cloudtrail.robot @@ -0,0 +1,215 @@ +*** Settings *** +Documentation AWS CloudTrail plugin + +Library OperatingSystem +Library Process +Library String + +Suite Setup Start Mockoon +Suite Teardown Stop Mockoon + + +*** Variables *** +${CENTREON_PLUGINS} ${CURDIR}${/}..${/}..${/}src${/}centreon_plugins.pl +${MOCKOON_JSON} ${CURDIR}${/}..${/}resources${/}mockoon${/}cloud-aws-cloudtrail.json + +${CMD} perl ${CENTREON_PLUGINS} --plugin=cloud::aws::cloudtrail::plugin --custommode=paws --region=eu-west --aws-secret-key=secret --aws-access-key=key + +&{checktrailstatus_value1} +... trailstatus=true +... trailname=TrailName +... result=OK: Trail is logging: 1 | 'trail_is_logging'=1;;;0; +&{checktrailstatus_value2} +... trailstatus=false +... trailname=TrailName +... result=CRITICAL: Trail is logging: 0 | 'trail_is_logging'=0;;;0; +@{checktrailstatus_values} &{checktrailstatus_value1} &{checktrailstatus_value2} + +&{countevents_value1} +... AwsApiCall=4 +... AwsServiceEvent=2 +... AwsConsoleAction=1 +... AwsConsoleSignIn=3 +... NextToken=false +... eventtype= +... delta= +... errormessage= +... warningcount= +... criticalcount= +... result=OK: Number of events: 10.00 | 'events_count'=10.00;;;0; +&{countevents_value2} +... AwsApiCall=4 +... AwsServiceEvent=2 +... AwsConsoleAction=1 +... AwsConsoleSignIn=3 +... NextToken=true +... eventtype= +... delta= +... errormessage= +... warningcount= +... criticalcount= +... result=OK: Number of events: 20.00 | 'events_count'=20.00;;;0; +&{countevents_value3} +... AwsApiCall=4 +... AwsServiceEvent=2 +... AwsConsoleAction=1 +... AwsConsoleSignIn=3 +... NextToken=false +... eventtype=AwsApiCall +... delta= +... errormessage= +... warningcount= +... criticalcount= +... result=OK: Number of events: 4.00 | 'events_count'=4.00;;;0; +&{countevents_value4} +... AwsApiCall=4 +... AwsServiceEvent=2 +... AwsConsoleAction=1 +... AwsConsoleSignIn=3 +... NextToken=true +... eventtype=AwsServiceEvent +... delta= +... errormessage= +... warningcount= +... criticalcount= +... result=OK: Number of events: 4.00 | 'events_count'=4.00;;;0; +&{countevents_value5} +... AwsApiCall=4 +... AwsServiceEvent=2 +... AwsConsoleAction=1 +... AwsConsoleSignIn=3 +... NextToken=false +... eventtype=AwsApiCall +... delta=10 +... errormessage= +... warningcount= +... criticalcount= +... result=OK: Number of events: 4.00 | 'events_count'=4.00;;;0; +&{countevents_value6} +... AwsApiCall=4 +... AwsServiceEvent=2 +... AwsConsoleAction=1 +... AwsConsoleSignIn=3 +... NextToken=false +... eventtype= +... delta= +... errormessage='Login error' +... warningcount= +... criticalcount= +... result=OK: Number of events: 3.00 | 'events_count'=3.00;;;0; +&{countevents_value7} +... AwsApiCall=4 +... AwsServiceEvent=2 +... AwsConsoleAction=1 +... AwsConsoleSignIn=3 +... NextToken=false +... eventtype= +... delta= +... errormessage='.*error' +... warningcount= +... criticalcount= +... result=OK: Number of events: 4.00 | 'events_count'=4.00;;;0; +&{countevents_value8} +... AwsApiCall=4 +... AwsServiceEvent=2 +... AwsConsoleAction=1 +... AwsConsoleSignIn=3 +... NextToken=false +... eventtype= +... delta= +... errormessage= +... warningcount=3 +... criticalcount= +... result=WARNING: Number of events: 10.00 | 'events_count'=10.00;;;0; +&{countevents_value9} +... AwsApiCall=4 +... AwsServiceEvent=2 +... AwsConsoleAction=1 +... AwsConsoleSignIn=3 +... NextToken=false +... eventtype= +... delta= +... errormessage= +... warningcount= +... criticalcount=5 +... result=CRITICAL: Number of events: 10.00 | 'events_count'=10.00;;;0; +@{countevents_values} +... &{countevents_value1} +... &{countevents_value2} +... &{countevents_value3} +... &{countevents_value4} +... &{countevents_value5} +... &{countevents_value6} +... &{countevents_value7} +... &{countevents_value8} +... &{countevents_value9} + + +*** Test Cases *** +AWS CloudTrail check trail status + [Documentation] Check AWS CloudTrail trail status + [Tags] cloud aws cloudtrail + FOR ${checktrailstatus_value} IN @{checktrailstatus_values} + ${output} = Run + ... ${CMD} --mode=checktrailstatus --endpoint=http://localhost:3000/cloudtrail/gettrailstatus/${checktrailstatus_value.trailstatus} --trail-name=${checktrailstatus_value.trailname} + Should Be Equal As Strings + ... ${output} + ... ${checktrailstatus_value.result} + ... msg=Wrong output result for check trail status of ${checktrailstatus_value} + END + +AWS CloudTrail count events + [Documentation] Check AWS CloudTrail count events + [Tags] cloud aws cloudtrail + FOR ${countevents_value} IN @{countevents_values} + ${command} = Catenate + ... ${CMD} + ... --mode=countevents + ... --endpoint=http://localhost:3000/cloudtrail/events/AwsApiCall/${countevents_value.AwsApiCall}/AwsServiceEvent/${countevents_value.AwsServiceEvent}/AwsConsoleAction/${countevents_value.AwsConsoleAction}/AwsConsoleSignIn/${countevents_value.AwsConsoleSignIn}/NextToken/${countevents_value.NextToken} + ${length} = Get Length ${countevents_value.eventtype} + IF ${length} > 0 + ${command} = Catenate ${command} --event-type=${countevents_value.eventtype} + END + ${length} = Get Length ${countevents_value.delta} + IF ${length} > 0 + ${command} = Catenate ${command} --delta=${countevents_value.delta} + END + ${length} = Get Length ${countevents_value.errormessage} + IF ${length} > 0 + ${command} = Catenate ${command} --error-message=${countevents_value.errormessage} + END + ${length} = Get Length ${countevents_value.warningcount} + IF ${length} > 0 + ${command} = Catenate ${command} --warning-count=${countevents_value.warningcount} + END + ${length} = Get Length ${countevents_value.criticalcount} + IF ${length} > 0 + ${command} = Catenate ${command} --critical-count=${countevents_value.criticalcount} + END + ${output} = Run ${command} + Should Be Equal As Strings + ... ${output} + ... ${countevents_value.result} + ... msg=Wrong output result for count events of ${countevents_value} + END + + +*** Keywords *** +Start Mockoon + ${executionresult} = Run Process + ... mockoon-cli + ... start + ... --data + ... ${MOCKOON_JSON} + ... --port + ... 3000 + ... --pname + ... azure-policyinsights + Should Be Empty ${executionresult.stderr} + +Stop Mockoon + ${executionresult} = Run Process + ... mockoon-cli + ... stop + ... mockoon-azure-policyinsights + Should Be Empty ${executionresult.stderr} diff --git a/tests/functional/cloud-azure-policyinsights-policystates.robot b/tests/functional/cloud-azure-policyinsights-policystates.robot new file mode 100644 index 000000000..8a06ec027 --- /dev/null +++ b/tests/functional/cloud-azure-policyinsights-policystates.robot @@ -0,0 +1,93 @@ +*** Settings *** +Documentation Azure PolicyInsights PolicyStates plugin + +Library OperatingSystem +Library Process +Library String + +Suite Setup Start Mockoon +Suite Teardown Stop Mockoon + + +*** Variables *** +${CENTREON_PLUGINS} ${CURDIR}${/}..${/}..${/}src${/}centreon_plugins.pl +${MOCKOON_JSON} ${CURDIR}${/}..${/}resources${/}mockoon${/}cloud-azure-policyinsights-policystates.json + +${LOGIN_ENDPOINT} http://localhost:3000/login +${CMD} perl ${CENTREON_PLUGINS} --plugin=cloud::azure::policyinsights::policystates::plugin --subscription=subscription --tenant=tenant --client-id=client_id --client-secret=secret --login-endpoint=${LOGIN_ENDPOINT} + +&{compliance_value1} +... endpoint=http://localhost:3000/ok +... policyname= +... resourcelocation= +... resourcetype= +... result=OK: Number of non compliant policies: 0 - All compliances states are ok | 'policies.non_compliant.count'=0;;;0; +&{compliance_value2} +... endpoint=http://localhost:3000/oknextlink +... policyname=9daedab3-fb2d-461e-b861-71790eead4f6 +... resourcelocation= +... resourcetype= +... result=OK: Number of non compliant policies: 0 - All compliances states are ok | 'policies.non_compliant.count'=0;;;0; +&{compliance_value3} +... endpoint=http://localhost:3000/nok1 +... policyname=9daedab3-fb2d-461e-b861-71790eead4f6 +... resourcelocation=fr +... resourcetype= +... result=CRITICAL: Compliance state for policy '9daedab3-fb2d-461e-b861-71790eead4f6' on resource 'mypubip1' is 'NonCompliant' | 'policies.non_compliant.count'=1;;;0; +&{compliance_value4} +... endpoint=http://localhost:3000/nok2 +... policyname=9daedab3-fb2d-461e-b861-71790eead4f6 +... resourcelocation=fr +... resourcetype=ip +... result=CRITICAL: Compliance state for policy '9daedab3-fb2d-461e-b861-71790eead4f6' on resource 'mypubip1' is 'NonCompliant' - Compliance state for policy '9daedab3-fb2d-461e-b861-71790eead4f6' on resource 'mypubip2' is 'NonCompliant' | 'policies.non_compliant.count'=2;;;0; +@{compliance_values} &{compliance_value1} &{compliance_value2} &{compliance_value3} &{compliance_value4} + + +*** Test Cases *** +Azure PolicyInsights PolicyStates compliance + [Documentation] Check Azure PolicyInsights PolicyStates compliance + [Tags] cloud azure policyinsights policystates + FOR ${compliance_value} IN @{compliance_values} + ${command} = Catenate + ... ${CMD} + ... --mode=compliance + ... --management-endpoint=${compliance_value.endpoint} + ${length} = Get Length ${compliance_value.policyname} + IF ${length} > 0 + ${command} = Catenate ${command} --policy-name=${compliance_value.policyname} + END + ${length} = Get Length ${compliance_value.resourcelocation} + IF ${length} > 0 + ${command} = Catenate ${command} --resource-location=${compliance_value.resourcelocation} + END + ${length} = Get Length ${compliance_value.resourcetype} + IF ${length} > 0 + ${command} = Catenate ${command} --resource-type=${compliance_value.resourcetype} + END + ${output} = Run ${command} + Should Be Equal As Strings + ... ${output} + ... ${compliance_value.result} + ... msg=Wrong output result for compliance of ${compliance_value} + END + + +*** Keywords *** +Start Mockoon + ${executionresult} = Run Process + ... mockoon-cli + ... start + ... --data + ... ${MOCKOON_JSON} + ... --port + ... 3000 + ... --pname + ... azure-policyinsights + Should Be Empty ${executionresult.stderr} + +Stop Mockoon + ${executionresult} = Run Process + ... mockoon-cli + ... stop + ... mockoon-azure-policyinsights + Should Be Empty ${executionresult.stderr} diff --git a/tests/resources/mockoon/cloud-azure-policyinsights-policystates.json b/tests/resources/mockoon/cloud-azure-policyinsights-policystates.json new file mode 100644 index 000000000..9163ce351 --- /dev/null +++ b/tests/resources/mockoon/cloud-azure-policyinsights-policystates.json @@ -0,0 +1,201 @@ +{ + "uuid": "101906e9-f832-416c-8781-880c33a0a778", + "lastMigration": 25, + "name": "Azure API", + "endpointPrefix": "", + "latency": 0, + "port": 3000, + "hostname": "0.0.0.0", + "folders": [], + "routes": [ + { + "uuid": "433aa2a7-20df-4682-88ef-4c87bd0882e1", + "documentation": "Azure login", + "method": "post", + "endpoint": "login/:tenant/oauth2/token", + "responses": [ + { + "uuid": "0c775d57-8661-4c4f-9f30-a3a134d6d09c", + "body": "{\n \"access_token\": \"token\",\n \"expires_on\": \"{{ faker 'random.numeric' 10 }}\"\n}", + "latency": 0, + "statusCode": 200, + "label": "", + "headers": [], + "bodyType": "INLINE", + "filePath": "", + "databucketID": "", + "sendFileAsBody": false, + "rules": [], + "rulesOperator": "OR", + "disableTemplating": false, + "fallbackTo404": false, + "default": true + } + ], + "enabled": true, + "responseMode": null + }, + { + "uuid": "3f190dd9-690a-413a-bafa-5c9d369b7d22", + "documentation": "", + "method": "post", + "endpoint": "ok/subscriptions/:subscriptionId/providers/Microsoft.PolicyInsights/policyStates/:policyStatesResource/queryResults", + "responses": [ + { + "uuid": "06ebc038-a4f5-48d5-8fb8-2403915a9754", + "body": "{\r\n \"@odata.nextLink\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest\",\r\n \"@odata.count\": 2,\r\n \"value\": [\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/resourceGroups/myrg1/providers/Microsoft.Network/publicIPAddresses/mypubip1\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/Enable Monitoring in Azure Security Center\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": true,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"Enable Monitoring in Azure Security Center\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"Compliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n },\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/resourceGroups/myrg1/providers/Microsoft.Network/publicIPAddresses/mypubip2\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/9ac09b0657d942e5ad4041a6\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": true,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"9ac09b0657d942e5ad4041a6\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"Compliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n },\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"mypubip3\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/9ac09b0657d942e5ad4041a6\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": true,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"9ac09b0657d942e5ad4041a6\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"Compliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n }\r\n ]\r\n}", + "latency": 0, + "statusCode": 200, + "label": "", + "headers": [], + "bodyType": "INLINE", + "filePath": "", + "databucketID": "", + "sendFileAsBody": false, + "rules": [], + "rulesOperator": "OR", + "disableTemplating": false, + "fallbackTo404": false, + "default": true + } + ], + "enabled": true, + "responseMode": null + }, + { + "uuid": "31c8940d-4623-444c-92e1-f340fe74b5b3", + "documentation": "", + "method": "post", + "endpoint": "nok1/subscriptions/:subscriptionId/providers/Microsoft.PolicyInsights/policyStates/:policyStatesResource/queryResults", + "responses": [ + { + "uuid": "64c245ca-0190-4b2e-89d5-87383148286c", + "body": "{\r\n \"@odata.nextLink\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest\",\r\n \"@odata.count\": 2,\r\n \"value\": [\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/resourceGroups/myrg1/providers/Microsoft.Network/publicIPAddresses/mypubip1\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/Enable Monitoring in Azure Security Center\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": false,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"Enable Monitoring in Azure Security Center\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"NonCompliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n },\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/resourceGroups/myrg1/providers/Microsoft.Network/publicIPAddresses/mypubip2\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/9ac09b0657d942e5ad4041a6\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": true,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"9ac09b0657d942e5ad4041a6\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"Compliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n }\r\n ]\r\n}", + "latency": 0, + "statusCode": 200, + "label": "", + "headers": [], + "bodyType": "INLINE", + "filePath": "", + "databucketID": "", + "sendFileAsBody": false, + "rules": [], + "rulesOperator": "OR", + "disableTemplating": false, + "fallbackTo404": false, + "default": true + } + ], + "enabled": true, + "responseMode": null + }, + { + "uuid": "13bf6e0e-8843-4681-942e-404b01326f32", + "documentation": "", + "method": "post", + "endpoint": "nok2/subscriptions/:subscriptionId/providers/Microsoft.PolicyInsights/policyStates/:policyStatesResource/queryResults", + "responses": [ + { + "uuid": "709a35af-cf2b-41f7-a224-3a946ffce703", + "body": "{\r\n \"@odata.nextLink\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest\",\r\n \"@odata.count\": 2,\r\n \"value\": [\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/resourceGroups/myrg1/providers/Microsoft.Network/publicIPAddresses/mypubip1\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/Enable Monitoring in Azure Security Center\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": false,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"Enable Monitoring in Azure Security Center\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"NonCompliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n },\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/resourceGroups/myrg1/providers/Microsoft.Network/publicIPAddresses/mypubip2\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/9ac09b0657d942e5ad4041a6\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": false,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"9ac09b0657d942e5ad4041a6\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"NonCompliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n }\r\n ]\r\n}", + "latency": 0, + "statusCode": 200, + "label": "", + "headers": [], + "bodyType": "INLINE", + "filePath": "", + "databucketID": "", + "sendFileAsBody": false, + "rules": [], + "rulesOperator": "OR", + "disableTemplating": false, + "fallbackTo404": false, + "default": true + } + ], + "enabled": true, + "responseMode": null + }, + { + "uuid": "1eb461f8-c128-432b-a7ca-7ddd71c28fa4", + "documentation": "", + "method": "post", + "endpoint": "oknextlink/subscriptions/:subscriptionId/providers/Microsoft.PolicyInsights/policyStates/:policyStatesResource/queryResults", + "responses": [ + { + "uuid": "a0daaaa4-9c21-4d4d-aa0a-a99da2de7479", + "body": "{\r\n \"@odata.nextLink\": \"http://localhost:3000/ok/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults\",\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest\",\r\n \"@odata.count\": 2,\r\n \"value\": [\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/resourceGroups/myrg1/providers/Microsoft.Network/publicIPAddresses/mypubip1\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/Enable Monitoring in Azure Security Center\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": true,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"Enable Monitoring in Azure Security Center\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"Compliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n },\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/resourceGroups/myrg1/providers/Microsoft.Network/publicIPAddresses/mypubip2\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/9ac09b0657d942e5ad4041a6\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": true,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"9ac09b0657d942e5ad4041a6\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"Compliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n },\r\n {\r\n \"@odata.id\": null,\r\n \"@odata.context\": \"https://management.azure.com/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity\",\r\n \"timestamp\": \"2019-10-09T17:48:05Z\",\r\n \"resourceId\": \"mypubip3\",\r\n \"policyAssignmentId\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852/providers/Microsoft.Authorization/policyAssignments/9ac09b0657d942e5ad4041a6\",\r\n \"policyDefinitionId\": \"/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"effectiveParameters\": null,\r\n \"isCompliant\": true,\r\n \"subscriptionId\": \"fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"resourceType\": \"/Microsoft.Network/publicIPAddresses\",\r\n \"resourceLocation\": \"eastus\",\r\n \"resourceGroup\": \"myrg1\",\r\n \"resourceTags\": \"tbd\",\r\n \"policyAssignmentName\": \"9ac09b0657d942e5ad4041a6\",\r\n \"policyAssignmentOwner\": \"tbd\",\r\n \"policyAssignmentParameters\": \"{}\",\r\n \"policyAssignmentScope\": \"/subscriptions/fffedd8f-ffff-fffd-fffd-fffed2f84852\",\r\n \"policyDefinitionName\": \"9daedab3-fb2d-461e-b861-71790eead4f6\",\r\n \"policyDefinitionAction\": \"AuditIfNotExists\",\r\n \"policyDefinitionCategory\": \"tbd\",\r\n \"policySetDefinitionId\": \"/providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionName\": \"1f3afdf9-d0c9-4c3d-847f-89da613e70a8\",\r\n \"policySetDefinitionOwner\": null,\r\n \"policySetDefinitionCategory\": null,\r\n \"policySetDefinitionParameters\": null,\r\n \"managementGroupIds\": \"mymg,fff988bf-fff1-ffff-fffb-fffcd011db47\",\r\n \"policyDefinitionReferenceId\": null,\r\n \"complianceState\": \"Compliant\",\r\n \"policyDefinitionGroupNames\": [\r\n \"myGroup\"\r\n ],\r\n \"policyDefinitionVersion\": \"1.0.0-preview\",\r\n \"policySetDefinitionVersion\": \"2.0.1\",\r\n \"policyAssignmentVersion\": \"1.0.0\"\r\n }\r\n ]\r\n}", + "latency": 0, + "statusCode": 200, + "label": "", + "headers": [], + "bodyType": "INLINE", + "filePath": "", + "databucketID": "", + "sendFileAsBody": false, + "rules": [], + "rulesOperator": "OR", + "disableTemplating": false, + "fallbackTo404": false, + "default": true + } + ], + "enabled": true, + "responseMode": null + } + ], + "rootChildren": [ + { + "type": "route", + "uuid": "433aa2a7-20df-4682-88ef-4c87bd0882e1" + }, + { + "type": "route", + "uuid": "3f190dd9-690a-413a-bafa-5c9d369b7d22" + }, + { + "type": "route", + "uuid": "1eb461f8-c128-432b-a7ca-7ddd71c28fa4" + }, + { + "type": "route", + "uuid": "31c8940d-4623-444c-92e1-f340fe74b5b3" + }, + { + "type": "route", + "uuid": "13bf6e0e-8843-4681-942e-404b01326f32" + } + ], + "proxyMode": false, + "proxyHost": "", + "proxyRemovePrefix": false, + "tlsOptions": { + "enabled": false, + "type": "CERT", + "pfxPath": "", + "certPath": "", + "keyPath": "", + "caPath": "", + "passphrase": "" + }, + "cors": true, + "headers": [ + { + "key": "Content-Type", + "value": "application/json" + } + ], + "proxyReqHeaders": [ + { + "key": "", + "value": "" + } + ], + "proxyResHeaders": [ + { + "key": "", + "value": "" + } + ], + "data": [] +} \ No newline at end of file