From 75400910ffbd46318a52d94005a1ff108f428b1b Mon Sep 17 00:00:00 2001 From: Ankit Tiwari Date: Sat, 7 Oct 2023 14:00:30 +0530 Subject: [PATCH] [CDS-81078]: updating go sdk for opa --- harness/policymgmt/.swagger-codegen/VERSION | 2 +- harness/policymgmt/README.md | 15 +- harness/policymgmt/api/swagger.yaml | 12124 ++++++++++------ harness/policymgmt/api_aida.go | 394 + harness/policymgmt/api_dashboard.go | 18 + harness/policymgmt/api_evaluate.go | 250 + harness/policymgmt/api_evaluations.go | 59 +- harness/policymgmt/api_policies.go | 22 +- harness/policymgmt/api_policysets.go | 31 +- harness/policymgmt/client.go | 3 + harness/policymgmt/docs/AidaApi.md | 87 + harness/policymgmt/docs/AnalyzeRequestBody.md | 10 + harness/policymgmt/docs/AnalyzeResponse.md | 10 + harness/policymgmt/docs/DashboardApi.md | 3 +- harness/policymgmt/docs/EvaluateApi.md | 52 +- .../docs/EvaluateByTypeCheckResponseBody.md | 9 + harness/policymgmt/docs/Evaluation.md | 2 +- harness/policymgmt/docs/EvaluationsApi.md | 13 +- .../policymgmt/docs/GenerateRequestBody.md | 10 + harness/policymgmt/docs/LinkedPolicy.md | 6 +- harness/policymgmt/docs/PoliciesApi.md | 6 +- harness/policymgmt/docs/Policy.md | 5 +- harness/policymgmt/docs/PolicyExample.md | 1 + harness/policymgmt/docs/PolicySample.md | 10 + harness/policymgmt/docs/PolicySet.md | 2 + harness/policymgmt/docs/PolicysetsApi.md | 11 +- harness/policymgmt/docs/ResourceGroup.md | 14 + .../docs/ResourceGroupIdentifier.md | 12 + harness/policymgmt/docs/UpdateRequestBody2.md | 2 + harness/policymgmt/docs/Variable.md | 14 + .../policymgmt/model_analyze_request_body.go | 16 + harness/policymgmt/model_analyze_response.go | 16 + ...el_evaluate_by_type_check_response_body.go | 14 + harness/policymgmt/model_evaluation.go | 2 +- .../policymgmt/model_generate_request_body.go | 16 + harness/policymgmt/model_linked_policy.go | 6 +- harness/policymgmt/model_policy.go | 8 +- harness/policymgmt/model_policy_example.go | 2 + harness/policymgmt/model_policy_sample.go | 16 + harness/policymgmt/model_policy_set.go | 4 + harness/policymgmt/model_resource_group.go | 24 + .../model_resource_group_identifier.go | 20 + .../policymgmt/model_update_request_body2.go | 6 +- harness/policymgmt/model_variable.go | 24 + harness/policymgmt/swagger/openapi3.json | 2 +- 45 files changed, 8827 insertions(+), 4546 deletions(-) create mode 100644 harness/policymgmt/api_aida.go create mode 100644 harness/policymgmt/docs/AidaApi.md create mode 100644 harness/policymgmt/docs/AnalyzeRequestBody.md create mode 100644 harness/policymgmt/docs/AnalyzeResponse.md create mode 100644 harness/policymgmt/docs/EvaluateByTypeCheckResponseBody.md create mode 100644 harness/policymgmt/docs/GenerateRequestBody.md create mode 100644 harness/policymgmt/docs/PolicySample.md create mode 100644 harness/policymgmt/docs/ResourceGroup.md create mode 100644 harness/policymgmt/docs/ResourceGroupIdentifier.md create mode 100644 harness/policymgmt/docs/Variable.md create mode 100644 harness/policymgmt/model_analyze_request_body.go create mode 100644 harness/policymgmt/model_analyze_response.go create mode 100644 harness/policymgmt/model_evaluate_by_type_check_response_body.go create mode 100644 harness/policymgmt/model_generate_request_body.go create mode 100644 harness/policymgmt/model_policy_sample.go create mode 100644 harness/policymgmt/model_resource_group.go create mode 100644 harness/policymgmt/model_resource_group_identifier.go create mode 100644 harness/policymgmt/model_variable.go diff --git a/harness/policymgmt/.swagger-codegen/VERSION b/harness/policymgmt/.swagger-codegen/VERSION index 3356a5d9..0cc68a7d 100644 --- a/harness/policymgmt/.swagger-codegen/VERSION +++ b/harness/policymgmt/.swagger-codegen/VERSION @@ -1 +1 @@ -3.0.36 \ No newline at end of file +3.0.47 \ No newline at end of file diff --git a/harness/policymgmt/README.md b/harness/policymgmt/README.md index f2570f6c..91a45c6e 100644 --- a/harness/policymgmt/README.md +++ b/harness/policymgmt/README.md @@ -21,10 +21,13 @@ All URIs are relative to *https://app.harness.io/gateway/pm/* Class | Method | HTTP request | Description ------------ | ------------- | ------------- | ------------- +*AidaApi* | [**AidaAnalyze**](docs/AidaApi.md#aidaanalyze) | **Post** /api/v1/aida/analyze | +*AidaApi* | [**AidaGenerate**](docs/AidaApi.md#aidagenerate) | **Post** /api/v1/aida/generate | *DashboardApi* | [**DashboardMetrics**](docs/DashboardApi.md#dashboardmetrics) | **Get** /api/v1/dashboard | *EvaluateApi* | [**EvaluateEvaluate**](docs/EvaluateApi.md#evaluateevaluate) | **Post** /api/v1/evaluate | *EvaluateApi* | [**EvaluateEvaluateByIds**](docs/EvaluateApi.md#evaluateevaluatebyids) | **Post** /api/v1/evaluate-by-ids | *EvaluateApi* | [**EvaluateEvaluateByType**](docs/EvaluateApi.md#evaluateevaluatebytype) | **Post** /api/v1/evaluate-by-type | +*EvaluateApi* | [**EvaluateEvaluateByTypeCheck**](docs/EvaluateApi.md#evaluateevaluatebytypecheck) | **Get** /api/v1/evaluate-by-type-check | evaluate-by-type-check evaluate *EvaluationsApi* | [**EvaluationsFind**](docs/EvaluationsApi.md#evaluationsfind) | **Get** /api/v1/evaluations/{id} | *EvaluationsApi* | [**EvaluationsList**](docs/EvaluationsApi.md#evaluationslist) | **Get** /api/v1/evaluations | *ExamplesApi* | [**ExamplesList**](docs/ExamplesApi.md#exampleslist) | **Get** /api/v1/examples | @@ -44,30 +47,34 @@ Class | Method | HTTP request | Description ## Documentation For Models - [AggregateStatus](docs/AggregateStatus.md) + - [AnalyzeRequestBody](docs/AnalyzeRequestBody.md) + - [AnalyzeResponse](docs/AnalyzeResponse.md) - [CreateRequestBody](docs/CreateRequestBody.md) - [CreateRequestBody2](docs/CreateRequestBody2.md) - [DashboardMetrics](docs/DashboardMetrics.md) - [ErrorResultWithIdentifier](docs/ErrorResultWithIdentifier.md) + - [EvaluateByTypeCheckResponseBody](docs/EvaluateByTypeCheckResponseBody.md) - [EvaluateRequestBody](docs/EvaluateRequestBody.md) - [EvaluatedPolicy](docs/EvaluatedPolicy.md) - [Evaluation](docs/Evaluation.md) - - [Evaluation2](docs/Evaluation2.md) - [EvaluationCounts](docs/EvaluationCounts.md) - [EvaluationDetail](docs/EvaluationDetail.md) - - [EvaluationDetail2](docs/EvaluationDetail2.md) + - [GenerateRequestBody](docs/GenerateRequestBody.md) - [GitErrorResult](docs/GitErrorResult.md) - [LinkedPolicy](docs/LinkedPolicy.md) - - [LinkedPolicy2](docs/LinkedPolicy2.md) - [Linkedpolicyidentifier](docs/Linkedpolicyidentifier.md) - [ModelError](docs/ModelError.md) - [Policy](docs/Policy.md) - [PolicyExample](docs/PolicyExample.md) - [PolicyHealth](docs/PolicyHealth.md) + - [PolicySample](docs/PolicySample.md) - [PolicySet](docs/PolicySet.md) - - [PolicySet2](docs/PolicySet2.md) + - [ResourceGroup](docs/ResourceGroup.md) + - [ResourceGroupIdentifier](docs/ResourceGroupIdentifier.md) - [ServiceVersion](docs/ServiceVersion.md) - [UpdateRequestBody](docs/UpdateRequestBody.md) - [UpdateRequestBody2](docs/UpdateRequestBody2.md) + - [Variable](docs/Variable.md) ## Documentation For Authorization diff --git a/harness/policymgmt/api/swagger.yaml b/harness/policymgmt/api/swagger.yaml index d47a0de6..679528b6 100644 --- a/harness/policymgmt/api/swagger.yaml +++ b/harness/policymgmt/api/swagger.yaml @@ -6,6 +6,8 @@ info: servers: - url: https://app.harness.io/gateway/pm/ tags: +- name: aida + description: AIDA API's for Harness OPA - name: dashboard description: "Aggregate summary of policies, policy sets and evaluations for display\ \ on the dashboard" @@ -22,6 +24,252 @@ tags: - name: system description: System version and health paths: + /api/v1/aida/analyze: + post: + tags: + - aida + description: Describe Policy On Basis of rego + operationId: aida#analyze + parameters: + - name: accountIdentifier + in: query + description: Harness account ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier + in: query + description: Harness organization ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier + in: query + description: Harness project ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness project ID + example: test-project + default: "" + example: test-project + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Et labore laudantium asperiores enim nesciunt. + example: Voluptas consequuntur aliquid accusantium. + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/AnalyzeRequestBody' + example: + entityType: encryptedJsonData example + rego: query example + required: true + responses: + "200": + description: OK response. + content: + application/json: + schema: + $ref: '#/components/schemas/AnalyzeResponse' + example: + desc: policy example + status: SUCCESS + "400": + description: "BadRequest: Bad Request response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "401": + description: "Unauthorized: Unauthorized response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "403": + description: "Forbidden: Forbidden response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "404": + description: "NotFound: Not Found response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + security: + - jwt_header_Authorization: + - core_governancePolicy_view + - core_governancePolicy_edit + - core_governancePolicy_delete + - core_governancePolicySets_view + - core_governancePolicySets_edit + - core_governancePolicySets_delete + - core_governancePolicySets_evaluate + - core_governance_admin + - api_key_header_x-api-key: [] + /api/v1/aida/generate: + post: + tags: + - aida + description: Generate Policy On Basis of free Text + operationId: aida#generate + parameters: + - name: accountIdentifier + in: query + description: Harness account ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier + in: query + description: Harness organization ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier + in: query + description: Harness project ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness project ID + example: test-project + default: "" + example: test-project + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Recusandae quisquam sunt veritatis id occaecati et. + example: Explicabo qui repellat. + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/GenerateRequestBody' + example: + policyData: encryptedJsonData example + query: query example + required: true + responses: + "200": + description: OK response. + content: + application/json: + schema: + $ref: '#/components/schemas/PolicySample' + example: + policy: policy example + status: SUCCESS + "400": + description: "BadRequest: Bad Request response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "401": + description: "Unauthorized: Unauthorized response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "403": + description: "Forbidden: Forbidden response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "404": + description: "NotFound: Not Found response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + security: + - jwt_header_Authorization: + - core_governancePolicy_view + - core_governancePolicy_edit + - core_governancePolicy_delete + - core_governancePolicySets_view + - core_governancePolicySets_edit + - core_governancePolicySets_delete + - core_governancePolicySets_evaluate + - core_governance_admin + - api_key_header_x-api-key: [] /api/v1/dashboard: get: tags: @@ -87,6 +335,17 @@ paths: example: test-project default: "" example: test-project + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Ea dolores voluptatem et optio sit minus. + example: Rerum voluptas explicabo voluptatem iusto voluptatem nihil. responses: "200": description: OK response. @@ -96,28 +355,24 @@ paths: $ref: '#/components/schemas/DashboardMetrics' example: aggregates: - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 + - error: 7047330649455918569 + pass: 5978409892349166329 + time: 3842596383256885522 + warning: 7820734117944797579 + - error: 7047330649455918569 + pass: 5978409892349166329 + time: 3842596383256885522 + warning: 7820734117944797579 policy_health: - total_evaluation_count: 7467880620589340301 + total_evaluation_count: 6897252924146464223 total_evaluation_entity_count: - error: 4962770580155356801 - pass: 1838564234748219477 - warning: 6712404284550845579 - total_policy_count: 1018281497905076142 - total_policy_set_count: 4767159674574934953 + error: 76024433486172609 + pass: 4127438089508318555 + warning: 511376631733875378 + total_policy_count: 2312323563280819911 + total_policy_set_count: 5354236275073299085 total_policy_set_entity_count: - A ut.: 8823333786778254735 + Possimus corporis doloremque nihil hic exercitationem.: 2751085338469200587 "400": description: "BadRequest: Bad Request response." content: @@ -164,6 +419,7 @@ paths: - core_governancePolicySets_delete - core_governancePolicySets_evaluate - core_governance_admin + - api_key_header_x-api-key: [] /api/v1/evaluate: post: tags: @@ -210,6 +466,17 @@ paths: example: test-project default: "" example: test-project + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Laboriosam magni inventore id ipsa. + example: Consequatur recusandae voluptatem sit unde excepturi nesciunt. requestBody: content: application/json: @@ -249,6 +516,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -315,6 +585,7 @@ paths: - core_governancePolicySets_delete - core_governancePolicySets_evaluate - core_governance_admin + - api_key_header_x-api-key: [] /api/v1/evaluate-by-ids: post: tags: @@ -429,9 +700,9 @@ paths: type: string description: "Deprecated: Please use 'principalIdentifier' and 'principalType'\ \ instead" - example: Voluptas qui veniam. + example: Quis expedita et labore dolorem et. default: "" - example: Nisi facere eaque. + example: Provident autem ut dolor. - name: ids in: query description: "Comma-separated list of identifiers for the policy sets that\ @@ -447,6 +718,17 @@ paths: \ should be evaluated, with account. or org. prefixes if needed" example: "policyset-1,policyset-2,policyset-3" example: "policyset-1,policyset-2,policyset-3" + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Aut accusantium. + example: Vel culpa dolorem mollitia qui sequi aliquam. responses: "200": description: OK response. @@ -484,6 +766,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -525,6 +810,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -566,6 +854,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -587,19 +878,6 @@ paths: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -620,6 +898,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -641,6 +922,19 @@ paths: rego: "" updated: 1636669297674 status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -661,6 +955,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -702,6 +999,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -723,19 +1023,6 @@ paths: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -756,6 +1043,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -797,6 +1087,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -818,6 +1111,19 @@ paths: rego: "" updated: 1636669297674 status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -838,6 +1144,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -859,19 +1168,6 @@ paths: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -892,6 +1188,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -933,6 +1232,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -974,6 +1276,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1010,7 +1315,7 @@ paths: org_id: test-org project_id: test-project status: error - type: pipeline + type: "pipeline,service" "400": description: "PolicySetNotFound: Bad Request response." content: @@ -1057,6 +1362,7 @@ paths: - core_governancePolicySets_delete - core_governancePolicySets_evaluate - core_governance_admin + - api_key_header_x-api-key: [] /api/v1/evaluate-by-type: post: tags: @@ -1197,9 +1503,20 @@ paths: type: string description: "Deprecated: Please use 'principalIdentifier' and 'principalType'\ \ instead" - example: Molestias nostrum dolor. + example: Ut suscipit error. default: "" - example: Explicabo ea excepturi natus unde dolores. + example: Numquam dolor quibusdam tenetur. + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Optio odit ea deserunt praesentium temporibus. + example: Eveniet et sunt. responses: "200": description: OK response. @@ -1237,6 +1554,53 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1278,6 +1642,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1319,6 +1686,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1373,6 +1743,53 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1414,6 +1831,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1455,6 +1875,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1509,6 +1932,53 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1550,6 +2020,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1591,6 +2064,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1645,6 +2121,53 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1686,6 +2209,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1727,6 +2253,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -1763,7 +2292,7 @@ paths: org_id: test-org project_id: test-project status: error - type: pipeline + type: "pipeline,service" "400": description: "PolicySetNotFound: Bad Request response." content: @@ -1810,12 +2339,15 @@ paths: - core_governancePolicySets_delete - core_governancePolicySets_evaluate - core_governance_admin - /api/v1/evaluations: + - api_key_header_x-api-key: [] + /api/v1/evaluate-by-type-check: get: tags: - - evaluations - description: List evaluations - operationId: evaluations#list + - evaluate + summary: evaluate-by-type-check evaluate + description: "Returns true if there are policies to evaluate for the given type,\ + \ action and acc/org/proj scope." + operationId: evaluate#evaluate-by-type-check parameters: - name: accountIdentifier in: query @@ -1856,22 +2388,174 @@ paths: example: test-project default: "" example: test-project - - name: per_page + - name: type in: query - description: Number of results per page - required: false + description: Type of entity under evaluation + required: true allowEmptyValue: true style: form explode: true schema: - maximum: 100 - minimum: 1 - type: integer - description: Number of results per page - example: 20 - default: 50 - example: 20 - - name: page + minLength: 1 + type: string + description: Type of entity under evaluation + example: pipeline + example: pipeline + - name: action + in: query + description: Action that triggered the evaluation + required: true + allowEmptyValue: true + style: form + explode: true + schema: + minLength: 1 + type: string + description: Action that triggered the evaluation + example: onrun + example: onrun + - name: entity + in: query + description: User-supplied global identifier of the entity under evaluation + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: User-supplied global identifier of the entity under evaluation + example: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + default: "" + example: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Dolor dolorem odit nihil consequatur. + example: Voluptatem nisi illo sapiente dolor repellat. + responses: + "200": + description: OK response. + content: + application/json: + schema: + $ref: '#/components/schemas/EvaluateByTypeCheckResponseBody' + example: + should_evaluate: false + "400": + description: "PolicySetNotFound: Bad Request response." + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + "401": + description: "Unauthorized: Unauthorized response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "403": + description: "Forbidden: Forbidden response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "404": + description: "NotFound: Not Found response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + security: + - jwt_header_Authorization: + - core_governancePolicy_view + - core_governancePolicy_edit + - core_governancePolicy_delete + - core_governancePolicySets_view + - core_governancePolicySets_edit + - core_governancePolicySets_delete + - core_governancePolicySets_evaluate + - core_governance_admin + - api_key_header_x-api-key: [] + /api/v1/evaluations: + get: + tags: + - evaluations + description: List evaluations + operationId: evaluations#list + parameters: + - name: accountIdentifier + in: query + description: Harness account ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier + in: query + description: Harness organization ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier + in: query + description: Harness project ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness project ID + example: test-project + default: "" + example: test-project + - name: per_page + in: query + description: Number of results per page + required: false + allowEmptyValue: true + style: form + explode: true + schema: + maximum: 100 + minimum: 1 + type: integer + description: Number of results per page + example: 20 + default: 50 + example: 20 + - name: page in: query description: Page number (starting from 0) required: false @@ -1934,6 +2618,44 @@ paths: format: int64 example: 123 example: 123 + - name: created_date_from + in: query + description: Retrieve results created from this date + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: integer + description: Retrieve results created from this date + format: int64 + example: 123 + example: 123 + - name: created_date_to + in: query + description: Retrieve results created up to this date + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: integer + description: Retrieve results created up to this date + format: int64 + example: 123 + example: 123 + - name: status + in: query + description: Retrieve results with these statuses + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Retrieve results with these statuses + example: "SUCCESS,WARNING,FAILED" + example: "SUCCESS,WARNING,FAILED" - name: includeChildScopes in: query description: "When true, evaluations from child scopes will be inculded in\ @@ -1946,9 +2668,20 @@ paths: type: boolean description: "When true, evaluations from child scopes will be inculded\ \ in the results" - example: false + example: true default: false example: false + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Minima dolorum. + example: Iusto eos voluptates est maiores. responses: "200": description: OK response. @@ -2052,6 +2785,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2093,6 +2829,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2114,19 +2853,6 @@ paths: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -2147,6 +2873,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2168,6 +2897,19 @@ paths: rego: "" updated: 1636669297674 status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -2188,6 +2930,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2209,19 +2954,6 @@ paths: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -2242,6 +2974,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2283,6 +3018,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2312,18 +3050,6 @@ paths: status: error type: pipeline updated: 1636669297674 - entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: 123 - input: "" - org_id: test-org - project_id: test-project - status: error - type: pipeline - - account_id: XRQAjvT37acOiXx9PRaQMF - action: onrun - created: 1636370209475 - details: - account_id: eBqAoNchMLKigC_qZ5EdC action: onrun created: 1636669297674 @@ -2349,6 +3075,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2390,6 +3119,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2411,17 +3143,61 @@ paths: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 description: Captures critical production policies details: - deny_messages: @@ -2444,6 +3220,53 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2485,6 +3308,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2514,6 +3340,18 @@ paths: status: error type: pipeline updated: 1636669297674 + entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + id: 123 + input: "" + org_id: test-org + project_id: test-project + status: error + type: "pipeline,service" + - account_id: XRQAjvT37acOiXx9PRaQMF + action: onrun + created: 1636370209475 + details: - account_id: eBqAoNchMLKigC_qZ5EdC action: onrun created: 1636669297674 @@ -2539,6 +3377,53 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2580,6 +3465,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -2609,852 +3497,1054 @@ paths: status: error type: pipeline updated: 1636669297674 - entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: 123 - input: "" - org_id: test-org - project_id: test-project - status: error - type: pipeline - items: - $ref: '#/components/schemas/Evaluation2' - x-content-type: application/json - example: - - account_id: XRQAjvT37acOiXx9PRaQMF - action: onrun - created: 1636370209475 - details: - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: 123 - input: "" - org_id: test-org - project_id: test-project - status: error - type: pipeline - - account_id: XRQAjvT37acOiXx9PRaQMF - action: onrun - created: 1636370209475 - details: - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project status: error - enabled: true - identifier: policyset-1 - name: Production Policies + type: pipeline + updated: 1636669297674 + entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + id: 123 + input: "" org_id: test-org project_id: test-project status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC + type: "pipeline,service" + - account_id: XRQAjvT37acOiXx9PRaQMF action: onrun - created: 1636669297674 - description: Captures critical production policies + created: 1636370209475 details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: 123 - input: "" - org_id: test-org - project_id: test-project - status: error - type: pipeline - - account_id: XRQAjvT37acOiXx9PRaQMF - action: onrun - created: 1636370209475 - details: - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval - step - - deployment stage 'example-stage' has step 'run-script' that - is forbidden type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string\ - \ m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already\ - \ exists in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - message: "Please check if there's already a file [file.rego]\ - \ in Github repository [rego-demo] for the given filepath\ - \ and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project status: error + type: pipeline + updated: 1636669297674 + entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + id: 123 + input: "" + org_id: test-org + project_id: test-project + status: error + type: "pipeline,service" + items: + $ref: '#/components/schemas/Evaluation' + x-content-type: application/json + example: + - account_id: XRQAjvT37acOiXx9PRaQMF + action: onrun + created: 1636370209475 + details: + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -3475,6 +4565,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -3496,31 +4589,6 @@ paths: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: 123 - input: "" - org_id: test-org - project_id: test-project - status: error - type: pipeline - - account_id: XRQAjvT37acOiXx9PRaQMF - action: onrun - created: 1636370209475 - details: - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step @@ -3541,6 +4609,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -3582,6 +4653,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -3636,6 +4710,53 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -3677,6 +4798,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -3731,6 +4855,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -3772,6 +4899,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -3793,138 +4923,58 @@ paths: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: 123 - input: "" - org_id: test-org - project_id: test-project - status: error - type: pipeline - "400": - description: "BadRequest: Bad Request response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "401": - description: "Unauthorized: Unauthorized response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "403": - description: "Forbidden: Forbidden response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "404": - description: "NotFound: Not Found response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "500": - description: "InternalServer: Internal Server Error response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "502": - description: "BadGateway: Bad Gateway response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - security: - - jwt_header_Authorization: - - core_governancePolicy_view - - core_governancePolicy_edit - - core_governancePolicy_delete - - core_governancePolicySets_view - - core_governancePolicySets_edit - - core_governancePolicySets_delete - - core_governancePolicySets_evaluate - - core_governance_admin - /api/v1/evaluations/{id}: - get: - tags: - - evaluations - description: Find an evaluation by ID - operationId: evaluations#find - parameters: - - name: accountIdentifier - in: query - description: Harness account ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness account ID - example: eBqAoNchMLKigC_qZ5EdC - default: "" - example: eBqAoNchMLKigC_qZ5EdC - - name: orgIdentifier - in: query - description: Harness organization ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness organization ID - example: test-org - default: "" - example: test-org - - name: projectIdentifier - in: query - description: Harness project ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness project ID - example: test-project - default: "" - example: test-project - - name: id - in: path - description: The ID of the evaluation to retrieve - required: true - style: simple - explode: false - schema: - type: integer - description: The ID of the evaluation to retrieve - format: int64 - example: 123 - example: 123 - responses: - "200": - description: OK response. - content: - application/json: - schema: - $ref: '#/components/schemas/Evaluation' - example: - account_id: XRQAjvT37acOiXx9PRaQMF - action: onrun - created: 1636370209475 - details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 - account_id: eBqAoNchMLKigC_qZ5EdC action: onrun created: 1636669297674 @@ -3950,6 +5000,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -3991,6 +5044,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -4032,6 +5088,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -4061,6 +5120,18 @@ paths: status: error type: pipeline updated: 1636669297674 + entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + id: 123 + input: "" + org_id: test-org + project_id: test-project + status: error + type: "pipeline,service" + - account_id: XRQAjvT37acOiXx9PRaQMF + action: onrun + created: 1636370209475 + details: - account_id: eBqAoNchMLKigC_qZ5EdC action: onrun created: 1636669297674 @@ -4086,6 +5157,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -4127,6 +5201,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -4168,6 +5245,9 @@ paths: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already\ \ exists in Github, thus couldn't create a new file" @@ -4197,1042 +5277,1639 @@ paths: status: error type: pipeline updated: 1636669297674 - entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: 123 - input: "" - org_id: test-org - project_id: test-project - status: error - type: pipeline - "400": - description: "BadRequest: Bad Request response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "401": - description: "Unauthorized: Unauthorized response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "403": - description: "Forbidden: Forbidden response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "404": - description: "NotFound: Not Found response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "500": - description: "InternalServer: Internal Server Error response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "502": - description: "BadGateway: Bad Gateway response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - security: - - jwt_header_Authorization: - - core_governancePolicy_view - - core_governancePolicy_edit - - core_governancePolicy_delete - - core_governancePolicySets_view - - core_governancePolicySets_edit - - core_governancePolicySets_delete - - core_governancePolicySets_evaluate - - core_governance_admin - /api/v1/examples: - get: - tags: - - examples - description: list examples - operationId: examples#list - parameters: - - name: accountIdentifier - in: query - description: Harness account ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness account ID - example: eBqAoNchMLKigC_qZ5EdC - default: "" - example: eBqAoNchMLKigC_qZ5EdC - - name: orgIdentifier - in: query - description: Harness organization ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness organization ID - example: test-org - default: "" - example: test-org - - name: projectIdentifier - in: query - description: Harness project ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness project ID - example: test-project - default: "" - example: test-project - - name: x-api-key - in: header - description: Harness PAT key used to perform authorization - required: false - style: simple - explode: false - schema: - type: string - description: Harness PAT key used to perform authorization - example: Consequatur ea. - example: Molestias qui cupiditate sint. - responses: - "200": - description: OK response. - content: - application/json: - schema: - type: array - example: - - desc: This is a pipeline example - input: "{\"message\": \"everyone\"}" - name: Pipeline example - rego: |- - package test - deny["should say hello world"] {input.message != "world"} - type: pipeline - - desc: This is a pipeline example - input: "{\"message\": \"everyone\"}" - name: Pipeline example - rego: |- - package test - deny["should say hello world"] {input.message != "world"} - type: pipeline - - desc: This is a pipeline example - input: "{\"message\": \"everyone\"}" - name: Pipeline example - rego: |- - package test - deny["should say hello world"] {input.message != "world"} + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error type: pipeline - items: - $ref: '#/components/schemas/PolicyExample' - x-content-type: application/json - example: - - desc: This is a pipeline example - input: "{\"message\": \"everyone\"}" - name: Pipeline example - rego: |- - package test - deny["should say hello world"] {input.message != "world"} - type: pipeline - - desc: This is a pipeline example - input: "{\"message\": \"everyone\"}" - name: Pipeline example - rego: |- - package test - deny["should say hello world"] {input.message != "world"} - type: pipeline - "400": - description: "BadRequest: Bad Request response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "401": - description: "Unauthorized: Unauthorized response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "403": - description: "Forbidden: Forbidden response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "404": - description: "NotFound: Not Found response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "500": - description: "InternalServer: Internal Server Error response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "502": - description: "BadGateway: Bad Gateway response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - security: - - jwt_header_Authorization: - - core_governancePolicy_view - - core_governancePolicy_edit - - core_governancePolicy_delete - - core_governancePolicySets_view - - core_governancePolicySets_edit - - core_governancePolicySets_delete - - core_governancePolicySets_evaluate - - core_governance_admin - - api_key_header_x-api-key: [] - /api/v1/policies: - get: - tags: - - policies - description: List all policies - operationId: policies#list - parameters: - - name: accountIdentifier - in: query - description: Harness account ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness account ID - example: eBqAoNchMLKigC_qZ5EdC - default: "" - example: eBqAoNchMLKigC_qZ5EdC - - name: orgIdentifier - in: query - description: Harness organization ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness organization ID - example: test-org - default: "" - example: test-org - - name: projectIdentifier - in: query - description: Harness project ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness project ID - example: test-project - default: "" - example: test-project - - name: per_page - in: query - description: Number of results per page - required: false - allowEmptyValue: true - style: form - explode: true - schema: - maximum: 100 - minimum: 1 - type: integer - description: Number of results per page - example: 20 - default: 50 - example: 20 - - name: page - in: query - description: Page number (starting from 0) - required: false - allowEmptyValue: true - style: form - explode: true - schema: - minimum: 0 - type: integer - description: Page number (starting from 0) - example: 4 - default: 0 - example: 4 - - name: searchTerm - in: query - description: Filter results by partial name match - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Filter results by partial name match - example: poli - default: "" - example: poli - - name: sort - in: query - description: Sort order for results - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Sort order for results - example: "name,ASC" - default: "name,ASC" - enum: - - "name,ASC" - - "name,DESC" - - "updated,ASC" - - "updated,DESC" - example: "name,DESC" - - name: x-api-key - in: header - description: Harness PAT key used to perform authorization - required: false - style: simple - explode: false - schema: - type: string - description: Harness PAT key used to perform authorization - example: Harum aliquam facere. - example: Adipisci et nesciunt libero. - responses: - "200": - description: OK response. - headers: - Link: - description: Link-based paging - required: true - style: simple - explode: false - schema: - type: string - description: Link-based paging - example: "" - example: "" - X-Page-Index: - description: Page number - required: true - style: simple - explode: false - schema: - type: integer - description: Page number - format: int64 - example: 4 - example: 4 - X-Page-Item-Count: - description: Number of results in this page - required: true - style: simple - explode: false - schema: - type: integer - description: Number of results in this page - format: int64 - example: 20 - example: 20 - X-Page-Size: - description: Requested page size - required: true - style: simple - explode: false - schema: - type: integer - description: Requested page size - format: int64 - example: 20 - example: 20 - X-Total-Items: - description: Total results available - required: true - style: simple - explode: false - schema: - type: integer - description: Total results available - format: int64 - example: 230 - example: 230 - X-Total-Pages: - description: Total pages available - required: true - style: simple - explode: false - schema: - type: integer - description: Total pages available - format: int64 - example: 12 - example: 12 - content: - application/json: - schema: - type: array - example: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" updated: 1636669297674 - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - items: - $ref: '#/components/schemas/Policy' - x-content-type: application/json - example: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - "400": - description: "GitError: Bad Request response." - content: - application/json: - schema: - $ref: '#/components/schemas/Error' - "401": - description: "Unauthorized: Unauthorized response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "403": - description: "Forbidden: Forbidden response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "404": - description: "NotFound: Not Found response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "500": - description: "InternalServer: Internal Server Error response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "502": - description: "BadGateway: Bad Gateway response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - security: - - jwt_header_Authorization: - - core_governancePolicy_view - - core_governancePolicy_edit - - core_governancePolicy_delete - - core_governancePolicySets_view - - core_governancePolicySets_edit - - core_governancePolicySets_delete - - core_governancePolicySets_evaluate - - core_governance_admin - - api_key_header_x-api-key: [] - post: - tags: - - policies - description: Create a policy - operationId: policies#create - parameters: - - name: accountIdentifier - in: query - description: Harness account ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness account ID - example: eBqAoNchMLKigC_qZ5EdC - default: "" - example: eBqAoNchMLKigC_qZ5EdC - - name: orgIdentifier - in: query - description: Harness organization ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness organization ID - example: test-org - default: "" - example: test-org - - name: projectIdentifier - in: query - description: Harness project ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness project ID - example: test-project - default: "" - example: test-project - - name: module - in: query - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - example: sto - enum: - - cd - - cf - - ci - - sto - - cv - example: cv - - name: git_commit_msg - in: query - description: The commit message used in git when creating the policy - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: The commit message used in git when creating the policy - example: harness policy commit msg - example: harness policy commit msg - - name: git_import - in: query - description: A flag to determine if the api should try and import and existing - policy from git - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: boolean - description: A flag to determine if the api should try and import and existing - policy from git - example: true - example: true - - name: git_branch - in: query - description: The git branch the policy will be created in - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: The git branch the policy will be created in - example: main - example: main - - name: git_is_new_branch - in: query - description: A flag to determine if the api should try and commit to a new - branch - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: boolean - description: A flag to determine if the api should try and commit to a new - branch - example: true - example: true - - name: git_base_branch - in: query - description: "If committing to a new branch, git_base_branch tells the api\ - \ which branch to base the new branch from" - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: "If committing to a new branch, git_base_branch tells the api\ - \ which branch to base the new branch from" - example: main - example: main - - name: x-api-key - in: header - description: Harness PAT key used to perform authorization - required: false - style: simple - explode: false - schema: - type: string - description: Harness PAT key used to perform authorization - example: Quis enim alias deserunt repudiandae quidem est. - example: Laudantium ea unde consequuntur. - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/CreateRequestBody' - example: - git_connector_ref: "." - git_path: .harness/policy.rego - git_repo: github.com/org/repo - identifier: policy-1 - name: Check that an approval step is present - rego: |- - package test - deny["should say hello world"] {input.message != "world"} - required: true - responses: - "201": - description: Created response. - content: - application/json: - schema: - $ref: '#/components/schemas/Policy' - example: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + id: 123 + input: "" org_id: test-org project_id: test-project - rego: "" - updated: 1636669297674 - "400": - description: "GitError: Bad Request response." - content: - application/json: - schema: - $ref: '#/components/schemas/Error' - "401": - description: "Unauthorized: Unauthorized response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "403": - description: "Forbidden: Forbidden response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "404": - description: "NotFound: Not Found response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "500": - description: "InternalServer: Internal Server Error response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "502": - description: "BadGateway: Bad Gateway response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - security: - - jwt_header_Authorization: - - core_governancePolicy_view - - core_governancePolicy_edit - - core_governancePolicy_delete - - core_governancePolicySets_view - - core_governancePolicySets_edit - - core_governancePolicySets_delete - - core_governancePolicySets_evaluate - - core_governance_admin - - api_key_header_x-api-key: [] - /api/v1/policies/{identifier}: - get: - tags: - - policies - description: Find a policy by identifier - operationId: policies#find - parameters: - - name: accountIdentifier - in: query - description: Harness account ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness account ID - example: eBqAoNchMLKigC_qZ5EdC - default: "" - example: eBqAoNchMLKigC_qZ5EdC - - name: orgIdentifier - in: query - description: Harness organization ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness organization ID - example: test-org - default: "" - example: test-org - - name: projectIdentifier - in: query - description: Harness project ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness project ID - example: test-project - default: "" - example: test-project - - name: git_branch - in: query - description: The git branch the policy resides in - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: The git branch the policy resides in - example: main - example: main - - name: identifier - in: path - description: Identifier of the policy to retrieve - required: true - style: simple - explode: false - schema: - minLength: 1 - type: string - description: Identifier of the policy to retrieve - example: policy-1 - example: policy-1 - - name: x-api-key - in: header - description: Harness PAT key used to perform authorization - required: false - style: simple - explode: false - schema: - type: string - description: Harness PAT key used to perform authorization - example: Nihil molestias iure iste aliquam excepturi hic. - example: Et voluptate nobis ex quis distinctio quis. - responses: - "200": - description: OK response. - content: - application/json: - schema: - $ref: '#/components/schemas/Policy' - example: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval + status: error + type: "pipeline,service" + - account_id: XRQAjvT37acOiXx9PRaQMF + action: onrun + created: 1636370209475 + details: + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + id: 123 + input: "" + org_id: test-org + project_id: test-project + status: error + type: "pipeline,service" + - account_id: XRQAjvT37acOiXx9PRaQMF + action: onrun + created: 1636370209475 + details: + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + id: 123 + input: "" org_id: test-org project_id: test-project - rego: "" - updated: 1636669297674 + status: error + type: "pipeline,service" "400": - description: "GitError: Bad Request response." - content: - application/json: - schema: - $ref: '#/components/schemas/Error' - "401": - description: "Unauthorized: Unauthorized response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "403": - description: "Forbidden: Forbidden response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "404": - description: "NotFound: Not Found response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "500": - description: "InternalServer: Internal Server Error response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "502": - description: "BadGateway: Bad Gateway response." + description: "BadRequest: Bad Request response." content: application/vnd.goa.error: schema: $ref: '#/components/schemas/Error' - security: - - jwt_header_Authorization: - - core_governancePolicy_view - - core_governancePolicy_edit - - core_governancePolicy_delete - - core_governancePolicySets_view - - core_governancePolicySets_edit - - core_governancePolicySets_delete - - core_governancePolicySets_evaluate - - core_governance_admin - - api_key_header_x-api-key: [] - delete: - tags: - - policies - description: Delete a policy by identifier - operationId: policies#delete - parameters: - - name: accountIdentifier - in: query - description: Harness account ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness account ID - example: eBqAoNchMLKigC_qZ5EdC - default: "" - example: eBqAoNchMLKigC_qZ5EdC - - name: orgIdentifier - in: query - description: Harness organization ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness organization ID - example: test-org - default: "" - example: test-org - - name: projectIdentifier - in: query - description: Harness project ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness project ID - example: test-project - default: "" - example: test-project - - name: module - in: query - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - example: ci - enum: - - cd - - cf - - ci - - sto - - cv - example: sto - - name: identifier - in: path - description: Identifier of the policy - required: true - style: simple - explode: false - schema: - minLength: 1 - type: string - description: Identifier of the policy - example: policy-1 - example: policy-1 - - name: x-api-key - in: header - description: Harness PAT key used to perform authorization - required: false - style: simple - explode: false - schema: - type: string - description: Harness PAT key used to perform authorization - example: Est quidem explicabo pariatur qui. - example: Molestiae non eaque et sunt. - responses: - "204": - description: No Content response. - "400": - description: "GitError: Bad Request response." - content: - application/json: - schema: - $ref: '#/components/schemas/Error' "401": description: "Unauthorized: Unauthorized response." content: @@ -5274,88 +6951,13 @@ paths: - core_governancePolicySets_evaluate - core_governance_admin - api_key_header_x-api-key: [] - patch: + /api/v1/evaluations/{id}: + get: tags: - - policies - description: Update a policy by identifier - operationId: policies#update - parameters: - - name: git_commit_msg - in: query - description: The commit message used in git when creating the policy - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: The commit message used in git when creating the policy - example: harness policy commit msg - example: harness policy commit msg - - name: git_is_new_branch - in: query - description: A flag to determine if the api should try and commit to a new - branch - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: boolean - description: A flag to determine if the api should try and commit to a new - branch - example: true - example: true - - name: git_base_branch - in: query - description: "If committing to a new branch, git_base_branch tells the api\ - \ which branch to base the new branch from" - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: "If committing to a new branch, git_base_branch tells the api\ - \ which branch to base the new branch from" - example: main - example: main - - name: git_branch - in: query - description: The git branch the policy resides in - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: The git branch the policy resides in - example: main - example: main - - name: git_commit_sha - in: query - description: The existing commit sha of the file being updated - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: The existing commit sha of the file being updated - example: 1369b45c20fc685113adcfd1a08a914180ff3c0d - example: 1369b45c20fc685113adcfd1a08a914180ff3c0d - - name: git_file_id - in: query - description: The existing file if od the bile being updated - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: The existing file if od the bile being updated - example: 1369b45c20fc685113adcfd1a08a914180ff3c0d - example: 1369b45c20fc685113adcfd1a08a914180ff3c0d + - evaluations + description: Find an evaluation by ID + operationId: evaluations#find + parameters: - name: accountIdentifier in: query description: Harness account ID @@ -5395,37 +6997,21 @@ paths: example: test-project default: "" example: test-project - - name: module - in: query - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - example: cd - enum: - - cd - - cf - - ci - - sto - - cv - example: cf - - name: identifier + - name: id in: path - description: Identifier of the policy + description: The ID of the evaluation to retrieve required: true style: simple explode: false schema: - type: string - description: Identifier of the policy - example: policy-1 - example: policy-1 + type: integer + description: The ID of the evaluation to retrieve + format: int64 + example: 123 + examples: + default: + summary: default + value: 123 - name: x-api-key in: header description: Harness PAT key used to perform authorization @@ -5435,26 +7021,410 @@ paths: schema: type: string description: Harness PAT key used to perform authorization - example: Accusantium quidem unde harum harum. - example: Ut dolores quae. - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/UpdateRequestBody' - example: - name: Check that an approval step is present - rego: |- - package test - deny["should say hello world"] {input.message != "world"} - required: true + example: Occaecati facere consequatur. + example: Eum velit sunt eum odio. responses: - "204": - description: No Content response. + "200": + description: OK response. + content: + application/json: + schema: + $ref: '#/components/schemas/Evaluation' + example: + account_id: XRQAjvT37acOiXx9PRaQMF + action: onrun + created: 1636370209475 + details: + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval + step + - deployment stage 'example-stage' has step 'run-script' that + is forbidden type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string\ + \ m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already\ + \ exists in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + message: "Please check if there's already a file [file.rego]\ + \ in Github repository [rego-demo] for the given filepath\ + \ and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + id: 123 + input: "" + org_id: test-org + project_id: test-project + status: error + type: "pipeline,service" "400": - description: "GitError: Bad Request response." + description: "BadRequest: Bad Request response." content: - application/json: + application/vnd.goa.error: schema: $ref: '#/components/schemas/Error' "401": @@ -5498,12 +7468,12 @@ paths: - core_governancePolicySets_evaluate - core_governance_admin - api_key_header_x-api-key: [] - /api/v1/policysets: + /api/v1/examples: get: tags: - - policysets - description: List all policy sets - operationId: policysets#list + - examples + description: list examples + operationId: examples#list parameters: - name: accountIdentifier in: query @@ -5512,124 +7482,38 @@ paths: allowEmptyValue: true style: form explode: true - schema: - type: string - description: Harness account ID - example: eBqAoNchMLKigC_qZ5EdC - default: "" - example: eBqAoNchMLKigC_qZ5EdC - - name: orgIdentifier - in: query - description: Harness organization ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness organization ID - example: test-org - default: "" - example: test-org - - name: projectIdentifier - in: query - description: Harness project ID - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Harness project ID - example: test-project - default: "" - example: test-project - - name: per_page - in: query - description: Number of results per page - required: false - allowEmptyValue: true - style: form - explode: true - schema: - maximum: 100 - minimum: 1 - type: integer - description: Number of results per page - example: 20 - default: 50 - example: 20 - - name: page - in: query - description: Page number (starting from 0) - required: false - allowEmptyValue: true - style: form - explode: true - schema: - minimum: 0 - type: integer - description: Page number (starting from 0) - example: 4 - default: 0 - example: 4 - - name: searchTerm - in: query - description: Filter results by partial name match - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Filter results by partial name match - example: poli - default: "" - example: poli - - name: sort - in: query - description: Sort order for results - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: Sort order for results - example: "updated,ASC" - default: "name,ASC" - enum: - - "name,ASC" - - "name,DESC" - - "updated,ASC" - - "updated,DESC" - example: "updated,ASC" - - name: type + schema: + type: string + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier in: query - description: Filter results by type + description: Harness organization ID required: false allowEmptyValue: true style: form explode: true schema: - minLength: 1 type: string - description: Filter results by type - example: pipeline - example: pipeline - - name: action + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier in: query - description: Filter results by action + description: Harness project ID required: false allowEmptyValue: true style: form explode: true schema: - minLength: 1 type: string - description: Filter results by action - example: onrun - example: onrun + description: Harness project ID + example: test-project + default: "" + example: test-project - name: x-api-key in: header description: Harness PAT key used to perform authorization @@ -5639,236 +7523,172 @@ paths: schema: type: string description: Harness PAT key used to perform authorization - example: Aliquid soluta repellendus numquam. - example: Eos inventore temporibus. + example: Repellendus corrupti. + example: Voluptate quia voluptatem. responses: "200": description: OK response. - headers: - Link: - description: Link-based paging - required: true - style: simple - explode: false - schema: - type: string - description: Link-based paging - example: "" - example: "" - X-Page-Index: - description: Page number - required: true - style: simple - explode: false - schema: - type: integer - description: Page number - format: int64 - example: 4 - example: 4 - X-Page-Item-Count: - description: Number of results in this page - required: true - style: simple - explode: false - schema: - type: integer - description: Number of results in this page - format: int64 - example: 20 - example: 20 - X-Page-Size: - description: Requested page size - required: true - style: simple - explode: false - schema: - type: integer - description: Requested page size - format: int64 - example: 20 - example: 20 - X-Total-Items: - description: Total results available - required: true - style: simple - explode: false - schema: - type: integer - description: Total results available - format: int64 - example: 230 - example: 230 - X-Total-Pages: - description: Total pages available - required: true - style: simple - explode: false - schema: - type: integer - description: Total pages available - format: int64 - example: 12 - example: 12 content: application/json: schema: type: array example: - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - policies: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - project_id: test-project - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - policies: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - project_id: test-project + - desc: This is a pipeline example + input: "{\"message\": \"everyone\"}" + name: Pipeline example + rego: |- + package test + deny["should say hello world"] {input.message != "world"} type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - policies: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - project_id: test-project + variables: + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - desc: This is a pipeline example + input: "{\"message\": \"everyone\"}" + name: Pipeline example + rego: |- + package test + deny["should say hello world"] {input.message != "world"} type: pipeline - updated: 1636669297674 + variables: + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval items: - $ref: '#/components/schemas/PolicySet' + $ref: '#/components/schemas/PolicyExample' x-content-type: application/json example: - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - policies: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - project_id: test-project - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - policies: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - project_id: test-project + - desc: This is a pipeline example + input: "{\"message\": \"everyone\"}" + name: Pipeline example + rego: |- + package test + deny["should say hello world"] {input.message != "world"} type: pipeline - updated: 1636669297674 + variables: + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - desc: This is a pipeline example + input: "{\"message\": \"everyone\"}" + name: Pipeline example + rego: |- + package test + deny["should say hello world"] {input.message != "world"} + type: pipeline + variables: + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval "400": description: "BadRequest: Bad Request response." content: @@ -5916,11 +7736,12 @@ paths: - core_governancePolicySets_evaluate - core_governance_admin - api_key_header_x-api-key: [] - post: + /api/v1/policies: + get: tags: - - policysets - description: Create a policy set - operationId: policysets#create + - policies + description: List all policies + operationId: policies#list parameters: - name: accountIdentifier in: query @@ -5961,26 +7782,66 @@ paths: example: test-project default: "" example: test-project - - name: module + - name: per_page + in: query + description: Number of results per page + required: false + allowEmptyValue: true + style: form + explode: true + schema: + maximum: 100 + minimum: 1 + type: integer + description: Number of results per page + example: 20 + default: 50 + example: 20 + - name: page + in: query + description: Page number (starting from 0) + required: false + allowEmptyValue: true + style: form + explode: true + schema: + minimum: 0 + type: integer + description: Page number (starting from 0) + example: 4 + default: 0 + example: 4 + - name: searchTerm + in: query + description: Filter results by partial name match + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Filter results by partial name match + example: poli + default: "" + example: poli + - name: sort in: query - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" + description: Sort order for results required: false allowEmptyValue: true style: form explode: true schema: type: string - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - example: cd + description: Sort order for results + example: "updated,DESC" + default: "name,ASC" enum: - - cd - - cf - - ci - - sto - - cv - example: cv + - "name,ASC" + - "name,DESC" + - "updated,ASC" + - "updated,DESC" + example: "name,ASC" - name: x-api-key in: header description: Harness PAT key used to perform authorization @@ -5990,72 +7851,225 @@ paths: schema: type: string description: Harness PAT key used to perform authorization - example: Et dolores cum. - example: Sed perspiciatis debitis. - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/CreateRequestBody2' - example: - action: onrun - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies - type: pipeline - required: true + example: Voluptatem quos assumenda blanditiis. + example: Modi molestias natus. responses: - "201": - description: Created response. + "200": + description: OK response. + headers: + Link: + description: Link-based paging + required: true + style: simple + explode: false + schema: + type: string + description: Link-based paging + example: "" + example: "" + X-Page-Index: + description: Page number + required: true + style: simple + explode: false + schema: + type: integer + description: Page number + format: int64 + example: 4 + example: 4 + X-Page-Item-Count: + description: Number of results in this page + required: true + style: simple + explode: false + schema: + type: integer + description: Number of results in this page + format: int64 + example: 20 + example: 20 + X-Page-Size: + description: Requested page size + required: true + style: simple + explode: false + schema: + type: integer + description: Requested page size + format: int64 + example: 20 + example: 20 + X-Total-Items: + description: Total results available + required: true + style: simple + explode: false + schema: + type: integer + description: Total results available + format: int64 + example: 230 + example: 230 + X-Total-Pages: + description: Total pages available + required: true + style: simple + explode: false + schema: + type: integer + description: Total pages available + format: int64 + example: 12 + example: 12 content: application/json: schema: - $ref: '#/components/schemas/PolicySet2' + type: array + example: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in\ + \ Github repository [rego-demo] for the given filepath and branch\ + \ [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in\ + \ Github repository [rego-demo] for the given filepath and branch\ + \ [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + items: + $ref: '#/components/schemas/Policy' + x-content-type: application/json example: - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in\ + \ Github repository [rego-demo] for the given filepath and branch\ + \ [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in\ + \ Github repository [rego-demo] for the given filepath and branch\ + \ [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC created: 1636669297674 - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in\ + \ Github repository [rego-demo] for the given filepath and branch\ + \ [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval org_id: test-org - policies: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 project_id: test-project - type: pipeline + rego: "" updated: 1636669297674 "400": - description: "BadRequest: Bad Request response." + description: "GitError: Bad Request response." content: - application/vnd.goa.error: + application/json: schema: $ref: '#/components/schemas/Error' "401": @@ -6099,12 +8113,11 @@ paths: - core_governancePolicySets_evaluate - core_governance_admin - api_key_header_x-api-key: [] - /api/v1/policysets/{identifier}: - get: + post: tags: - - policysets - description: Find a policy set by identifier - operationId: policysets#find + - policies + description: Create a policy + operationId: policies#create parameters: - name: accountIdentifier in: query @@ -6145,18 +8158,72 @@ paths: example: test-project default: "" example: test-project - - name: identifier - in: path - description: Identifier of the policy set to retrieve - required: true - style: simple - explode: false + - name: git_commit_msg + in: query + description: The commit message used in git when creating the policy + required: false + allowEmptyValue: true + style: form + explode: true schema: - minLength: 1 type: string - description: Identifier of the policy set to retrieve - example: policyset-1 - example: policyset-1 + description: The commit message used in git when creating the policy + example: harness policy commit msg + example: harness policy commit msg + - name: git_import + in: query + description: A flag to determine if the api should try and import and existing + policy from git + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: boolean + description: A flag to determine if the api should try and import and existing + policy from git + example: true + example: true + - name: git_branch + in: query + description: The git branch the policy will be created in + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: The git branch the policy will be created in + example: main + example: main + - name: git_is_new_branch + in: query + description: A flag to determine if the api should try and commit to a new + branch + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: boolean + description: A flag to determine if the api should try and commit to a new + branch + example: true + example: true + - name: git_base_branch + in: query + description: "If committing to a new branch, git_base_branch tells the api\ + \ which branch to base the new branch from" + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: "If committing to a new branch, git_base_branch tells the api\ + \ which branch to base the new branch from" + example: main + example: main - name: x-api-key in: header description: Harness PAT key used to perform authorization @@ -6166,50 +8233,62 @@ paths: schema: type: string description: Harness PAT key used to perform authorization - example: Ad quo sequi animi perspiciatis. - example: Maiores quia et fugiat cum architecto. + example: Dolor nam impedit sunt sint. + example: Est dolorum molestias. + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/CreateRequestBody' + example: + git_connector_ref: "." + git_path: .harness/policy.rego + git_repo: github.com/org/repo + identifier: policy-1 + name: Check that an approval step is present + rego: |- + package test + deny["should say hello world"] {input.message != "world"} + required: true responses: - "200": - description: OK response. + "201": + description: Created response. content: application/json: schema: - $ref: '#/components/schemas/PolicySet2' + $ref: '#/components/schemas/Policy' example: account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun created: 1636669297674 - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in\ + \ Github repository [rego-demo] for the given filepath and branch\ + \ [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval org_id: test-org - policies: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 project_id: test-project - type: pipeline + rego: "" updated: 1636669297674 "400": - description: "BadRequest: Bad Request response." + description: "GitError: Bad Request response." content: - application/vnd.goa.error: + application/json: schema: $ref: '#/components/schemas/Error' "401": @@ -6253,11 +8332,12 @@ paths: - core_governancePolicySets_evaluate - core_governance_admin - api_key_header_x-api-key: [] - delete: + /api/v1/policies/{identifier}: + get: tags: - - policysets - description: Delete a policy set by identifier - operationId: policysets#delete + - policies + description: Find a policy by identifier + operationId: policies#find parameters: - name: accountIdentifier in: query @@ -6298,38 +8378,51 @@ paths: example: test-project default: "" example: test-project - - name: module + - name: git_branch in: query - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" + description: The git branch the policy resides in required: false allowEmptyValue: true style: form explode: true schema: type: string - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - example: cd - enum: - - cd - - cf - - ci - - sto - - cv - example: cd + description: The git branch the policy resides in + example: main + example: main + - name: show_summary + in: query + description: "Setting to true returns the metadata about the\n\t\t\t requested\ + \ policy including the information held about the status of this policy\ + \ in the default branch.\n\t\t\t git_branch is ignored as no git operation\ + \ takes place." + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: boolean + description: "Setting to true returns the metadata about the\n\t\t\t \ + \ requested policy including the information held about the status of\ + \ this policy in the default branch.\n\t\t\t git_branch is ignored\ + \ as no git operation takes place." + example: true + example: true - name: identifier in: path - description: Identifier of the policy set + description: Identifier of the policy to retrieve required: true style: simple explode: false schema: minLength: 1 type: string - description: Identifier of the policy set - example: policyset-1 - example: policyset-1 + description: Identifier of the policy to retrieve + example: policy-1 + examples: + default: + summary: default + value: policy-1 - name: x-api-key in: header description: Harness PAT key used to perform authorization @@ -6339,15 +8432,47 @@ paths: schema: type: string description: Harness PAT key used to perform authorization - example: Veniam cum praesentium et corrupti harum. - example: Enim velit exercitationem natus voluptatem placeat occaecati. + example: Molestiae accusantium. + example: Fugit ut qui voluptatem ea et at. responses: - "204": - description: No Content response. + "200": + description: OK response. + content: + application/json: + schema: + $ref: '#/components/schemas/Policy' + example: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in\ + \ Github repository [rego-demo] for the given filepath and branch\ + \ [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 "400": - description: "BadRequest: Bad Request response." + description: "GitError: Bad Request response." content: - application/vnd.goa.error: + application/json: schema: $ref: '#/components/schemas/Error' "401": @@ -6391,11 +8516,11 @@ paths: - core_governancePolicySets_evaluate - core_governance_admin - api_key_header_x-api-key: [] - patch: + delete: tags: - - policysets - description: Update a policy set by identifier - operationId: policysets#update + - policies + description: Delete a policy by identifier + operationId: policies#delete parameters: - name: accountIdentifier in: query @@ -6436,37 +8561,21 @@ paths: example: test-project default: "" example: test-project - - name: module - in: query - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - required: false - allowEmptyValue: true - style: form - explode: true - schema: - type: string - description: "The module in which the resource was created, updated or deleted.\ - \ Only relevant in the context of a project" - example: cf - enum: - - cd - - cf - - ci - - sto - - cv - example: cf - name: identifier in: path - description: Identifier of the policy set + description: Identifier of the policy required: true style: simple explode: false schema: + minLength: 1 type: string - description: Identifier of the policy set - example: policyset-1 - example: policyset-1 + description: Identifier of the policy + example: policy-1 + examples: + default: + summary: default + value: policy-1 - name: x-api-key in: header description: Harness PAT key used to perform authorization @@ -6476,36 +8585,15 @@ paths: schema: type: string description: Harness PAT key used to perform authorization - example: Quo voluptatum minima nulla facere. - example: Unde quidem et sint. - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/UpdateRequestBody2' - example: - action: onrun - description: Captures critical production policies - enabled: true - name: Production Policies - policies: - - identifier: policy-1 - severity: warning - - identifier: policy-1 - severity: warning - - identifier: policy-1 - severity: warning - - identifier: policy-1 - severity: warning - type: pipeline - required: true + example: Labore quia assumenda nobis in. + example: Tempora accusantium praesentium ratione aperiam facere iusto. responses: "204": description: No Content response. "400": - description: "BadRequest: Bad Request response." + description: "GitError: Bad Request response." content: - application/vnd.goa.error: + application/json: schema: $ref: '#/components/schemas/Error' "401": @@ -6549,1175 +8637,2030 @@ paths: - core_governancePolicySets_evaluate - core_governance_admin - api_key_header_x-api-key: [] - /api/v1/system/health: - get: - tags: - - system - description: Check service health - operationId: system#health - responses: - "204": - description: No Content response. - "500": - description: "InternalServer: Internal Server Error response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "502": - description: "BadGateway: Bad Gateway response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - /api/v1/system/version: - get: + patch: tags: - - system - description: Check service version - operationId: system#version - responses: - "200": - description: OK response. - content: - application/json: - schema: - $ref: '#/components/schemas/ServiceVersion' - example: - commit: 96381692bf3a2bd7904769c6886e832435768b57 - version: v0.123.0 - "500": - description: "InternalServer: Internal Server Error response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' - "502": - description: "BadGateway: Bad Gateway response." - content: - application/vnd.goa.error: - schema: - $ref: '#/components/schemas/Error' -components: - schemas: - AggregateStatus: - required: - - error - - pass - - time - - warning - type: object - properties: - error: - type: integer - description: Count of evaluations that have a status of 'error' - format: int64 - example: 6131954873636422800 - pass: - type: integer - description: Count of evaluations that have a status of 'pass' - format: int64 - example: 6122119631547907047 - time: - type: integer - description: The Unix time of this particular aggregation - format: int64 - example: 4891691738930437908 - warning: - type: integer - description: Count of evaluations that have a status of 'warning' - format: int64 - example: 4996866704380369589 - description: Aggregate metrics for evaluations on a single day - example: - error: 2174285678586957279 - pass: 6713433384340029592 - time: 1299583733304690280 - warning: 2581612184076268921 - CreateRequestBody: - required: - - account_id - - created - - identifier - - name - - org_id - - project_id - - rego - - updated - type: object - properties: - git_connector_ref: - type: string - description: The harness connector used for authenticating on the git provider - example: "." - git_path: - type: string - description: The path to the file in the git repo - example: .harness/policy.rego - git_repo: - type: string - description: The git repo the policy resides in - example: github.com/org/repo - identifier: - minLength: 1 - type: string - description: Identifier for the policy - example: policy-1 - name: - minLength: 1 - type: string - description: Name of the policy - example: Check that an approval step is present - rego: - minLength: 1 - type: string - description: Rego that defines the policy policy - example: |- - package test - deny["should say hello world"] {input.message != "world"} - example: - git_connector_ref: "." - git_path: .harness/policy.rego - git_repo: github.com/org/repo - identifier: policy-1 - name: Check that an approval step is present - rego: |- - package test - deny["should say hello world"] {input.message != "world"} - CreateRequestBody2: - required: - - account_id - - action - - created - - enabled - - identifier - - name - - org_id - - project_id - - type - - updated - type: object - properties: - action: - minLength: 1 - type: string - description: Action that triggers the policy set - example: onrun - description: + - policies + description: Update a policy by identifier + operationId: policies#update + parameters: + - name: git_commit_msg + in: query + description: The commit message used in git when creating the policy + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: Description of the policy set - example: Captures critical production policies - enabled: + description: The commit message used in git when creating the policy + example: harness policy commit msg + example: harness policy commit msg + - name: git_is_new_branch + in: query + description: A flag to determine if the api should try and commit to a new + branch + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: boolean - description: Only enabled policy sets are evaluated when evaluating by type/action + description: A flag to determine if the api should try and commit to a new + branch example: true - identifier: - minLength: 1 + example: true + - name: git_base_branch + in: query + description: "If committing to a new branch, git_base_branch tells the api\ + \ which branch to base the new branch from" + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: Identifier for the policy set - example: policyset-1 - name: - minLength: 1 + description: "If committing to a new branch, git_base_branch tells the api\ + \ which branch to base the new branch from" + example: main + example: main + - name: git_branch + in: query + description: The git branch the policy resides in + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: Name of the policy set - example: Production Policies - type: - minLength: 1 + description: The git branch the policy resides in + example: main + example: main + - name: git_commit_sha + in: query + description: The existing commit sha of the file being updated + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: Type of input suitable for the policy set - example: pipeline - example: - action: onrun - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies - type: pipeline - DashboardMetrics: - required: - - aggregates - - policy_health - type: object - properties: - aggregates: - type: array - description: Aggregate evaluation counts by day - example: - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 - items: - $ref: '#/components/schemas/AggregateStatus' - policy_health: - $ref: '#/components/schemas/PolicyHealth' - example: - aggregates: - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 - - error: 1201513832267580740 - pass: 2920020791307846359 - time: 461119712411546138 - warning: 6971582622373151866 - policy_health: - total_evaluation_count: 7467880620589340301 - total_evaluation_entity_count: - error: 4962770580155356801 - pass: 1838564234748219477 - warning: 6712404284550845579 - total_policy_count: 1018281497905076142 - total_policy_set_count: 4767159674574934953 - total_policy_set_entity_count: - A ut.: 8823333786778254735 - Error: - required: - - fault - - id - - message - - name - - temporary - - timeout - type: object - properties: - fault: - type: boolean - description: Is the error a server-side fault? - example: true - id: + description: The existing commit sha of the file being updated + example: 1369b45c20fc685113adcfd1a08a914180ff3c0d + example: 1369b45c20fc685113adcfd1a08a914180ff3c0d + - name: git_file_id + in: query + description: "The existing file id of the file being updated, not required\ + \ for bitbucket files" + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: ID is a unique identifier for this particular occurrence of - the problem. - example: 123abc - message: + description: "The existing file id of the file being updated, not required\ + \ for bitbucket files" + example: 1369b45c20fc685113adcfd1a08a914180ff3c0d + example: 1369b45c20fc685113adcfd1a08a914180ff3c0d + - name: accountIdentifier + in: query + description: Harness account ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: Message is a human-readable explanation specific to this occurrence - of the problem. - example: parameter 'p' must be an integer - name: + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier + in: query + description: Harness organization ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: Name is the name of this class of errors. - example: bad_request - temporary: - type: boolean - description: Is the error temporary? - example: true - timeout: - type: boolean - description: Is the error a timeout? - example: false - example: - id: 3F1FKVRR - message: Value of ID must be an integer - name: bad_request - ErrorResultWithIdentifier: - required: - - fault - - id - - message - - name - - temporary - - timeout - type: object - properties: - fault: - type: boolean - description: Is the error a server-side fault? - example: false - id: + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier + in: query + description: Harness project ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: ID is a unique identifier for this particular occurrence of - the problem. - example: 123abc - identifier: + description: Harness project ID + example: test-project + default: "" + example: test-project + - name: identifier + in: path + description: Identifier of the policy + required: true + style: simple + explode: false + schema: type: string - description: the identifier associated with the error + description: Identifier of the policy example: policy-1 - message: - type: string - description: Message is a human-readable explanation specific to this occurrence - of the problem. - example: parameter 'p' must be an integer - name: + example: policy-1 + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: type: string - description: Name is the name of this class of errors. - example: bad_request - temporary: - type: boolean - description: Is the error temporary? - example: true - timeout: - type: boolean - description: Is the error a timeout? - example: true - example: - fault: false - id: 123abc - identifier: policy-1 - message: parameter 'p' must be an integer - name: bad_request - temporary: true - timeout: false - EvaluateRequestBody: - required: - - input - - rego - type: object - properties: - input: + description: Harness PAT key used to perform authorization + example: Tempore non beatae suscipit qui qui. + example: Fuga maiores excepturi voluptates architecto. + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/UpdateRequestBody' + example: + name: Check that an approval step is present + rego: |- + package test + deny["should say hello world"] {input.message != "world"} + required: true + responses: + "204": + description: No Content response. + "400": + description: "GitError: Bad Request response." + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + "401": + description: "Unauthorized: Unauthorized response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "403": + description: "Forbidden: Forbidden response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "404": + description: "NotFound: Not Found response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + security: + - jwt_header_Authorization: + - core_governancePolicy_view + - core_governancePolicy_edit + - core_governancePolicy_delete + - core_governancePolicySets_view + - core_governancePolicySets_edit + - core_governancePolicySets_delete + - core_governancePolicySets_evaluate + - core_governance_admin + - api_key_header_x-api-key: [] + /api/v1/policysets: + get: + tags: + - policysets + description: List all policy sets + operationId: policysets#list + parameters: + - name: accountIdentifier + in: query + description: Harness account ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: Input to evaluate - format: binary - example: !!binary |- - eyJtZXNzYWdlIjogImV2ZXJ5b25lIn0= - rego: - minLength: 1 + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier + in: query + description: Harness organization ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: Arbitrary rego to be evaluated - example: |- - package test - deny["should say hello world"] {input.message != "world"} - example: - input: "{\"message\": \"everyone\"}" - rego: |- - package test - deny["should say hello world"] {input.message != "world"} - EvaluatedPolicy: - required: - - deny_messages - - error - - output - - policy - - status - type: object - properties: - deny_messages: - type: array - description: The values of any `deny` rego rules as returned by the rego - engine - example: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - items: - type: string - example: Quia animi et harum velit officia. - error: + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier + in: query + description: Harness project ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: Any errors returned by the rego engine when this policy was - evaluated - example: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: + description: Harness project ID + example: test-project + default: "" + example: test-project + - name: per_page + in: query + description: Number of results per page + required: false + allowEmptyValue: true + style: form + explode: true + schema: + maximum: 100 + minimum: 1 + type: integer + description: Number of results per page + example: 20 + default: 50 + example: 20 + - name: page + in: query + description: Page number (starting from 0) + required: false + allowEmptyValue: true + style: form + explode: true + schema: + minimum: 0 + type: integer + description: Page number (starting from 0) + example: 4 + default: 0 + example: 4 + - name: searchTerm + in: query + description: Filter results by partial name match + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: The output returned by the rego engine when this policy was - evaluated - format: binary - example: !!binary |- - ewogICAgImRlbnkiOiBbCiAgICAgICAgImRlcGxveW1lbnQgc3RhZ2UgJ2RlcGxveScgZG9lcyBu - b3QgaGF2ZSBhIEhhcm5lc3NBcHByb3ZhbCBzdGVwIgogICAgXSwKICAgICJzdGFnZXNfd2l0aF9h - cHByb3ZhbCI6IFtdCn0= - policy: - $ref: '#/components/schemas/Policy' - status: + description: Filter results by partial name match + example: poli + default: "" + example: poli + - name: sort + in: query + description: Sort order for results + required: false + allowEmptyValue: true + style: form + explode: true + schema: type: string - description: The overall status for this individual policy indicating whether - it passed - example: error + description: Sort order for results + example: "updated,ASC" + default: "name,ASC" enum: - - error - - warning - - pass - example: - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists in Github,\ - \ thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github repository\ - \ [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - Evaluation: - required: - - account_id - - action - - created - - details - - entity - - entity_metadata - - id - - input - - org_id - - project_id - - status - - type - type: object - properties: - account_id: + - "name,ASC" + - "name,DESC" + - "updated,ASC" + - "updated,DESC" + example: "name,DESC" + - name: type + in: query + description: Filter results by type + required: false + allowEmptyValue: true + style: form + explode: true + schema: + minLength: 1 type: string - description: The Harness account in which the evaluation was performed - example: XRQAjvT37acOiXx9PRaQMF - action: + description: Filter results by type + example: pipeline + example: pipeline + - name: action + in: query + description: Filter results by action + required: false + allowEmptyValue: true + style: form + explode: true + schema: + minLength: 1 type: string - description: The action that triggered evaluation + description: Filter results by action example: onrun - created: - type: integer - description: The time at which the evaluation was performed in Unix time - millseconds - format: int64 - example: 1636370209475 - details: - type: array - description: The detailed results of te evaluation - example: - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ - \ \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ - \ \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ - \ \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ - \ \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC + example: onrun + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Cupiditate qui minus molestias aspernatur. + example: Velit maxime repudiandae velit dolores itaque neque. + responses: + "200": + description: OK response. + headers: + Link: + description: Link-based paging + required: true + style: simple + explode: false + schema: + type: string + description: Link-based paging + example: "" + example: "" + X-Page-Index: + description: Page number + required: true + style: simple + explode: false + schema: + type: integer + description: Page number + format: int64 + example: 4 + example: 4 + X-Page-Item-Count: + description: Number of results in this page + required: true + style: simple + explode: false + schema: + type: integer + description: Number of results in this page + format: int64 + example: 20 + example: 20 + X-Page-Size: + description: Requested page size + required: true + style: simple + explode: false + schema: + type: integer + description: Requested page size + format: int64 + example: 20 + example: 20 + X-Total-Items: + description: Total results available + required: true + style: simple + explode: false + schema: + type: integer + description: Total results available + format: int64 + example: 230 + example: 230 + X-Total-Pages: + description: Total pages available + required: true + style: simple + explode: false + schema: + type: integer + description: Total pages available + format: int64 + example: 12 + example: 12 + content: + application/json: + schema: + type: array + example: + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + identifier: policyset-1 + name: Production Policies + org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + project_id: test-project + resource_groups: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + identifier: policyset-1 + name: Production Policies + org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + project_id: test-project + resource_groups: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + identifier: policyset-1 + name: Production Policies + org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + project_id: test-project + resource_groups: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + identifier: policyset-1 + name: Production Policies + org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + project_id: test-project + resource_groups: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + type: pipeline + updated: 1636669297674 + items: + $ref: '#/components/schemas/PolicySet' + x-content-type: application/json + example: + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + identifier: policyset-1 + name: Production Policies org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 project_id: test-project - rego: "" + resource_groups: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + type: pipeline updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ - \ \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + identifier: policyset-1 + name: Production Policies org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 project_id: test-project - rego: "" + resource_groups: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + type: pipeline updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ - \ \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + identifier: policyset-1 + name: Production Policies org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 project_id: test-project - rego: "" + resource_groups: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + type: pipeline updated: 1636669297674 - status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ - \ \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + identifier: policyset-1 + name: Production Policies org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 project_id: test-project - rego: "" + resource_groups: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + type: pipeline updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ - \ \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: + "400": + description: "BadRequest: Bad Request response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "401": + description: "Unauthorized: Unauthorized response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "403": + description: "Forbidden: Forbidden response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "404": + description: "NotFound: Not Found response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + security: + - jwt_header_Authorization: + - core_governancePolicy_view + - core_governancePolicy_edit + - core_governancePolicy_delete + - core_governancePolicySets_view + - core_governancePolicySets_edit + - core_governancePolicySets_delete + - core_governancePolicySets_evaluate + - core_governance_admin + - api_key_header_x-api-key: [] + post: + tags: + - policysets + description: Create a policy set + operationId: policysets#create + parameters: + - name: accountIdentifier + in: query + description: Harness account ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier + in: query + description: Harness organization ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier + in: query + description: Harness project ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness project ID + example: test-project + default: "" + example: test-project + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Modi quia est vel. + example: Voluptas et repudiandae sint fugit consequatur sunt. + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/CreateRequestBody2' + example: + action: onrun + description: Captures critical production policies + enabled: true + identifier: policyset-1 + name: Production Policies + type: pipeline + required: true + responses: + "201": + description: Created response. + content: + application/json: + schema: + $ref: '#/components/schemas/PolicySet' + example: account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + identifier: policyset-1 + name: Production Policies org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 project_id: test-project - rego: "" + resource_groups: + - account_id: Natus in voluptatibus eum. + created: 8207205165608517655 + identifier: Alias quaerat accusamus aut voluptatem illo voluptate. + name: Dolor voluptatibus error quia dolores molestiae. + org_id: Accusantium sed. + project_id: Officiis voluptatem corrupti amet porro. + - account_id: Natus in voluptatibus eum. + created: 8207205165608517655 + identifier: Alias quaerat accusamus aut voluptatem illo voluptate. + name: Dolor voluptatibus error quia dolores molestiae. + org_id: Accusantium sed. + project_id: Officiis voluptatem corrupti amet porro. + - account_id: Natus in voluptatibus eum. + created: 8207205165608517655 + identifier: Alias quaerat accusamus aut voluptatem illo voluptate. + name: Dolor voluptatibus error quia dolores molestiae. + org_id: Accusantium sed. + project_id: Officiis voluptatem corrupti amet porro. + - account_id: Natus in voluptatibus eum. + created: 8207205165608517655 + identifier: Alias quaerat accusamus aut voluptatem illo voluptate. + name: Dolor voluptatibus error quia dolores molestiae. + org_id: Accusantium sed. + project_id: Officiis voluptatem corrupti amet porro. + type: pipeline updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ - \ \"test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: + "400": + description: "BadRequest: Bad Request response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "401": + description: "Unauthorized: Unauthorized response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "403": + description: "Forbidden: Forbidden response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "404": + description: "NotFound: Not Found response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + security: + - jwt_header_Authorization: + - core_governancePolicy_view + - core_governancePolicy_edit + - core_governancePolicy_delete + - core_governancePolicySets_view + - core_governancePolicySets_edit + - core_governancePolicySets_delete + - core_governancePolicySets_evaluate + - core_governance_admin + - api_key_header_x-api-key: [] + /api/v1/policysets/{identifier}: + get: + tags: + - policysets + description: Find a policy set by identifier + operationId: policysets#find + parameters: + - name: accountIdentifier + in: query + description: Harness account ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier + in: query + description: Harness organization ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier + in: query + description: Harness project ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness project ID + example: test-project + default: "" + example: test-project + - name: identifier + in: path + description: Identifier of the policy set to retrieve + required: true + style: simple + explode: false + schema: + minLength: 1 + type: string + description: Identifier of the policy set to retrieve + example: policyset-1 + examples: + default: + summary: default + value: policyset-1 + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Molestiae nobis. + example: Eos et neque debitis. + responses: + "200": + description: OK response. + content: + application/json: + schema: + $ref: '#/components/schemas/PolicySet' + example: account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in\ - \ Github repository [rego-demo] for the given filepath and branch\ - \ [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_resource_groups + identifier: policyset-1 + name: Production Policies org_id: test-org + policies: + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + severity: warning + updated: 1636669297674 project_id: test-project - rego: "" + resource_groups: + - account_id: Natus in voluptatibus eum. + created: 8207205165608517655 + identifier: Alias quaerat accusamus aut voluptatem illo voluptate. + name: Dolor voluptatibus error quia dolores molestiae. + org_id: Accusantium sed. + project_id: Officiis voluptatem corrupti amet porro. + - account_id: Natus in voluptatibus eum. + created: 8207205165608517655 + identifier: Alias quaerat accusamus aut voluptatem illo voluptate. + name: Dolor voluptatibus error quia dolores molestiae. + org_id: Accusantium sed. + project_id: Officiis voluptatem corrupti amet porro. + - account_id: Natus in voluptatibus eum. + created: 8207205165608517655 + identifier: Alias quaerat accusamus aut voluptatem illo voluptate. + name: Dolor voluptatibus error quia dolores molestiae. + org_id: Accusantium sed. + project_id: Officiis voluptatem corrupti amet porro. + type: pipeline updated: 1636669297674 - status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - items: - $ref: '#/components/schemas/EvaluationDetail' - entity: + "400": + description: "BadRequest: Bad Request response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "401": + description: "Unauthorized: Unauthorized response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "403": + description: "Forbidden: Forbidden response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "404": + description: "NotFound: Not Found response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + security: + - jwt_header_Authorization: + - core_governancePolicy_view + - core_governancePolicy_edit + - core_governancePolicy_delete + - core_governancePolicySets_view + - core_governancePolicySets_edit + - core_governancePolicySets_delete + - core_governancePolicySets_evaluate + - core_governance_admin + - api_key_header_x-api-key: [] + delete: + tags: + - policysets + description: Delete a policy set by identifier + operationId: policysets#delete + parameters: + - name: accountIdentifier + in: query + description: Harness account ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier + in: query + description: Harness organization ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier + in: query + description: Harness project ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness project ID + example: test-project + default: "" + example: test-project + - name: identifier + in: path + description: Identifier of the policy set + required: true + style: simple + explode: false + schema: + minLength: 1 + type: string + description: Identifier of the policy set + example: policyset-1 + examples: + default: + summary: default + value: policyset-1 + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: + type: string + description: Harness PAT key used to perform authorization + example: Temporibus omnis incidunt. + example: Libero perspiciatis quidem dolorem. + responses: + "204": + description: No Content response. + "400": + description: "BadRequest: Bad Request response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "401": + description: "Unauthorized: Unauthorized response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "403": + description: "Forbidden: Forbidden response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "404": + description: "NotFound: Not Found response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + security: + - jwt_header_Authorization: + - core_governancePolicy_view + - core_governancePolicy_edit + - core_governancePolicy_delete + - core_governancePolicySets_view + - core_governancePolicySets_edit + - core_governancePolicySets_delete + - core_governancePolicySets_evaluate + - core_governance_admin + - api_key_header_x-api-key: [] + patch: + tags: + - policysets + description: Update a policy set by identifier + operationId: policysets#update + parameters: + - name: accountIdentifier + in: query + description: Harness account ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness account ID + example: eBqAoNchMLKigC_qZ5EdC + default: "" + example: eBqAoNchMLKigC_qZ5EdC + - name: orgIdentifier + in: query + description: Harness organization ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness organization ID + example: test-org + default: "" + example: test-org + - name: projectIdentifier + in: query + description: Harness project ID + required: false + allowEmptyValue: true + style: form + explode: true + schema: + type: string + description: Harness project ID + example: test-project + default: "" + example: test-project + - name: identifier + in: path + description: Identifier of the policy set + required: true + style: simple + explode: false + schema: type: string - description: An arbtrary user-supplied string that globally identifies the - entity under evaluation - example: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: + description: Identifier of the policy set + example: policyset-1 + example: policyset-1 + - name: x-api-key + in: header + description: Harness PAT key used to perform authorization + required: false + style: simple + explode: false + schema: type: string - description: Additional arbtrary user-supplied metadta about the entity - under evaluation - example: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: + description: Harness PAT key used to perform authorization + example: Qui id. + example: Et quia quibusdam quia. + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/UpdateRequestBody2' + example: + action: onrun + description: Captures critical production policies + enabled: true + entity_selector: all_entities_in_scope + name: Production Policies + policies: + - identifier: policy-1 + severity: warning + - identifier: policy-1 + severity: warning + resource_groups: + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. + type: pipeline + required: true + responses: + "204": + description: No Content response. + "400": + description: "BadRequest: Bad Request response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "401": + description: "Unauthorized: Unauthorized response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "403": + description: "Forbidden: Forbidden response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "404": + description: "NotFound: Not Found response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + security: + - jwt_header_Authorization: + - core_governancePolicy_view + - core_governancePolicy_edit + - core_governancePolicy_delete + - core_governancePolicySets_view + - core_governancePolicySets_edit + - core_governancePolicySets_delete + - core_governancePolicySets_evaluate + - core_governance_admin + - api_key_header_x-api-key: [] + /api/v1/system/health: + get: + tags: + - system + description: Check service health + operationId: system#health + responses: + "204": + description: No Content response. + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + /api/v1/system/version: + get: + tags: + - system + description: Check service version + operationId: system#version + responses: + "200": + description: OK response. + content: + application/json: + schema: + $ref: '#/components/schemas/ServiceVersion' + example: + commit: 96381692bf3a2bd7904769c6886e832435768b57 + version: v0.123.0 + "500": + description: "InternalServer: Internal Server Error response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' + "502": + description: "BadGateway: Bad Gateway response." + content: + application/vnd.goa.error: + schema: + $ref: '#/components/schemas/Error' +components: + schemas: + AggregateStatus: + required: + - error + - pass + - time + - warning + type: object + properties: + error: type: integer - description: The ID of this evaluation + description: Count of evaluations that have a status of 'error' format: int64 - example: 123 - input: + example: 2145947970278403974 + pass: + type: integer + description: Count of evaluations that have a status of 'pass' + format: int64 + example: 1566636922489795804 + time: + type: integer + description: The Unix time of this particular aggregation + format: int64 + example: 6444281447444376236 + warning: + type: integer + description: Count of evaluations that have a status of 'warning' + format: int64 + example: 3822979756498340663 + description: Aggregate metrics for evaluations on a single day + example: + error: 7485873470259043471 + pass: 7518284088002695828 + time: 1258329275222359809 + warning: 7009721869929871245 + AnalyzeRequestBody: + type: object + properties: + entityType: type: string - description: The input provided at evaluation time - format: binary - example: !!binary "" - org_id: + description: Type of entity on which rego is written on + example: encryptedJsonData example + rego: + type: string + description: Rego Policy + example: query example + example: + entityType: encryptedJsonData example + rego: query example + AnalyzeResponse: + required: + - desc + - status + type: object + properties: + desc: + type: string + description: Build identifier + example: policy example + status: + type: string + description: status + example: SUCCESS + example: + desc: policy example + status: SUCCESS + CreateRequestBody: + required: + - account_id + - created + - identifier + - name + - org_id + - project_id + - rego + - updated + type: object + properties: + git_connector_ref: + type: string + description: The harness connector used for authenticating on the git provider + example: "." + git_path: + type: string + description: The path to the file in the git repo + example: .harness/policy.rego + git_repo: + type: string + description: The git repo the policy resides in + example: github.com/org/repo + identifier: + minLength: 1 + type: string + description: Identifier for the policy + example: policy-1 + name: + minLength: 1 + type: string + description: Name of the policy + example: Check that an approval step is present + rego: + minLength: 1 + type: string + description: Rego that defines the policy policy + example: |- + package test + deny["should say hello world"] {input.message != "world"} + example: + git_connector_ref: "." + git_path: .harness/policy.rego + git_repo: github.com/org/repo + identifier: policy-1 + name: Check that an approval step is present + rego: |- + package test + deny["should say hello world"] {input.message != "world"} + CreateRequestBody2: + required: + - account_id + - action + - created + - enabled + - entity_selector + - identifier + - name + - org_id + - project_id + - type + - updated + type: object + properties: + action: + minLength: 1 + type: string + description: Action that triggers the policy set + example: onrun + description: type: string - description: The Harness organisation in which the evaluation was performed - example: test-org - project_id: + description: Description of the policy set + example: Captures critical production policies + enabled: + type: boolean + description: Only enabled policy sets are evaluated when evaluating by type/action + example: true + identifier: + minLength: 1 type: string - description: The Harness project in which the evaluation was performed - example: test-project - status: + description: Identifier for the policy set + example: policyset-1 + name: + minLength: 1 type: string - description: The overall status of the evaluation indicating whether it - passed - example: error - enum: - - error - - warning - - pass + description: Name of the policy set + example: Production Policies type: + minLength: 1 type: string - description: The type of the entity under evaluation + description: Type of input suitable for the policy set example: pipeline example: - account_id: XRQAjvT37acOiXx9PRaQMF action: onrun - created: 1636370209475 - details: - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun + description: Captures critical production policies + enabled: true + identifier: policyset-1 + name: Production Policies + type: pipeline + DashboardMetrics: + required: + - aggregates + - policy_health + type: object + properties: + aggregates: + type: array + description: Aggregate evaluation counts by day + example: + - error: 7047330649455918569 + pass: 5978409892349166329 + time: 3842596383256885522 + warning: 7820734117944797579 + - error: 7047330649455918569 + pass: 5978409892349166329 + time: 3842596383256885522 + warning: 7820734117944797579 + items: + $ref: '#/components/schemas/AggregateStatus' + policy_health: + $ref: '#/components/schemas/PolicyHealth' + example: + aggregates: + - error: 7047330649455918569 + pass: 5978409892349166329 + time: 3842596383256885522 + warning: 7820734117944797579 + - error: 7047330649455918569 + pass: 5978409892349166329 + time: 3842596383256885522 + warning: 7820734117944797579 + - error: 7047330649455918569 + pass: 5978409892349166329 + time: 3842596383256885522 + warning: 7820734117944797579 + - error: 7047330649455918569 + pass: 5978409892349166329 + time: 3842596383256885522 + warning: 7820734117944797579 + policy_health: + total_evaluation_count: 6897252924146464223 + total_evaluation_entity_count: + error: 76024433486172609 + pass: 4127438089508318555 + warning: 511376631733875378 + total_policy_count: 2312323563280819911 + total_policy_set_count: 5354236275073299085 + total_policy_set_entity_count: + Possimus corporis doloremque nihil hic exercitationem.: 2751085338469200587 + Error: + required: + - fault + - id + - message + - name + - temporary + - timeout + type: object + properties: + fault: + type: boolean + description: Is the error a server-side fault? + example: false + id: + type: string + description: ID is a unique identifier for this particular occurrence of + the problem. + example: 123abc + message: + type: string + description: Message is a human-readable explanation specific to this occurrence + of the problem. + example: parameter 'p' must be an integer + name: + type: string + description: Name is the name of this class of errors. + example: bad_request + temporary: + type: boolean + description: Is the error temporary? + example: true + timeout: + type: boolean + description: Is the error a timeout? + example: false + example: + id: 3F1FKVRR + message: Value of ID must be an integer + name: bad_request + ErrorResultWithIdentifier: + required: + - fault + - id + - message + - name + - temporary + - timeout + type: object + properties: + fault: + type: boolean + description: Is the error a server-side fault? + example: true + id: + type: string + description: ID is a unique identifier for this particular occurrence of + the problem. + example: 123abc + identifier: + type: string + description: the identifier associated with the error + example: policy-1 + message: + type: string + description: Message is a human-readable explanation specific to this occurrence + of the problem. + example: parameter 'p' must be an integer + name: + type: string + description: Name is the name of this class of errors. + example: bad_request + temporary: + type: boolean + description: Is the error temporary? + example: true + timeout: + type: boolean + description: Is the error a timeout? + example: true + example: + fault: false + id: 123abc + identifier: policy-1 + message: parameter 'p' must be an integer + name: bad_request + temporary: false + timeout: true + EvaluateByTypeCheckResponseBody: + required: + - should_evaluate + type: object + properties: + should_evaluate: + type: boolean + description: "Boolean value that indicates if there are policies to evaluate\ + \ for the given type, action and acc/org/proj scope." + example: false + example: + should_evaluate: false + EvaluateRequestBody: + required: + - input + - rego + type: object + properties: + input: + type: string + description: Input to evaluate + format: binary + example: !!binary |- + eyJtZXNzYWdlIjogImV2ZXJ5b25lIn0= + rego: + minLength: 1 + type: string + description: Arbitrary rego to be evaluated + example: |- + package test + deny["should say hello world"] {input.message != "world"} + example: + input: "{\"message\": \"everyone\"}" + rego: |- + package test + deny["should say hello world"] {input.message != "world"} + EvaluatedPolicy: + required: + - deny_messages + - error + - output + - policy + - status + type: object + properties: + deny_messages: + type: array + description: The values of any `deny` rego rules as returned by the rego + engine + example: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + items: + type: string + example: Culpa quas numquam dolores repellendus distinctio omnis. + error: + type: string + description: Any errors returned by the rego engine when this policy was + evaluated + example: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ + test" + output: + type: string + description: The output returned by the rego engine when this policy was + evaluated + format: binary + example: !!binary |- + ewogICAgImRlbnkiOiBbCiAgICAgICAgImRlcGxveW1lbnQgc3RhZ2UgJ2RlcGxveScgZG9lcyBu + b3QgaGF2ZSBhIEhhcm5lc3NBcHByb3ZhbCBzdGVwIgogICAgXSwKICAgICJzdGFnZXNfd2l0aF9h + cHByb3ZhbCI6IFtdCn0= + policy: + $ref: '#/components/schemas/Policy' + status: + type: string + description: The overall status for this individual policy indicating whether + it passed + example: error + enum: + - error + - warning + - pass + example: + deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string m == \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists\ - \ in Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - enabled: true - identifier: policyset-1 - name: Production Policies + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists in Github,\ + \ thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github repository\ + \ [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval org_id: test-org project_id: test-project - status: error - type: pipeline + rego: "" updated: 1636669297674 - entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: 123 - input: "" - org_id: test-org - project_id: test-project status: error - type: pipeline - Evaluation2: + Evaluation: required: - account_id - action @@ -7775,6 +10718,93 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in\ + \ Github repository [rego-demo] for the given filepath and branch\ + \ [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ + \ \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in\ + \ Github repository [rego-demo] for the given filepath and branch\ + \ [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string m ==\ + \ \"test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -7814,6 +10844,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -7866,6 +10899,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -7905,6 +10941,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -7925,19 +10964,6 @@ components: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step - deployment stage 'example-stage' has step 'run-script' that is forbidden @@ -7957,6 +10983,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -7996,6 +11025,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8025,7 +11057,7 @@ components: type: pipeline updated: 1636669297674 items: - $ref: '#/components/schemas/EvaluationDetail2' + $ref: '#/components/schemas/EvaluationDetail' entity: type: string description: An arbtrary user-supplied string that globally identifies the @@ -8065,9 +11097,8 @@ components: - pass type: type: string - description: The type of the entity under evaluation - example: pipeline - description: The result of a single evaluation + description: The types of the entity under evaluation + example: "pipeline,service" example: account_id: XRQAjvT37acOiXx9PRaQMF action: onrun @@ -8097,6 +11128,186 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ + test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ + test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ + test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project + status: error + type: pipeline + updated: 1636669297674 + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ + test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8135,6 +11346,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8154,19 +11368,6 @@ components: rego: "" updated: 1636669297674 status: error - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - project_id: test-project - status: error - type: pipeline - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step - deployment stage 'example-stage' has step 'run-script' that is forbidden @@ -8186,6 +11387,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8224,6 +11428,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8251,79 +11458,11 @@ components: status: error type: pipeline updated: 1636669297674 - entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e - id: 123 - input: "" - org_id: test-org - project_id: test-project - status: error - type: pipeline - EvaluationCounts: - required: - - error - - pass - - warning - type: object - properties: - error: - type: integer - description: Count of evaluations that have a status of 'error' - format: int64 - example: 4970251986521508580 - pass: - type: integer - description: Count of evaluations that have a status of 'pass' - format: int64 - example: 307083773713586752 - warning: - type: integer - description: Count of evaluations that have a status of 'warning' - format: int64 - example: 1502739105740891635 - description: Evaluation counts by status - example: - error: 5942734405936107822 - pass: 4691718722125000343 - warning: 690944801675665669 - EvaluationDetail: - required: - - account_id - - action - - created - - details - - enabled - - identifier - - name - - org_id - - project_id - - status - - type - - updated - type: object - properties: - account_id: - type: string - description: Harness account ID associated with this policy set - example: eBqAoNchMLKigC_qZ5EdC - default: "" - action: - minLength: 1 - type: string - description: Action that triggers the policy set - example: onrun - created: - type: integer - description: Time the policy set was created - format: int64 - example: 1636669297674 - description: - type: string - description: Description of the policy set - example: Captures critical production policies - details: - type: array - example: + - account_id: eBqAoNchMLKigC_qZ5EdC + action: onrun + created: 1636669297674 + description: Captures critical production policies + details: - deny_messages: - deployment stage 'example-stage' does not have a HarnessApproval step - deployment stage 'example-stage' has step 'run-script' that is forbidden @@ -8343,6 +11482,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8381,6 +11523,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8419,6 +11564,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8438,183 +11586,105 @@ components: rego: "" updated: 1636669297674 status: error - items: - $ref: '#/components/schemas/EvaluatedPolicy' - enabled: - type: boolean - description: Only enabled policy sets are evaluated when evaluating by type/action - example: true - identifier: - minLength: 1 - type: string - description: Identifier of the policy set - example: policyset-1 - name: - minLength: 1 - type: string - description: Name of the policy set - example: Production Policies - org_id: - type: string - description: Harness organization ID associated with this policy set - example: test-org - default: "" - project_id: - type: string - description: Harness project ID associated with this policy set - example: test-project - default: "" - status: - type: string - description: The overall status for this policy set indicating whether it - passed - example: error - enum: - - error - - warning - - pass - type: - minLength: 1 - type: string - description: Type of input suitable for the policy set - example: pipeline - updated: - type: integer - description: Time the policy set was last updated - format: int64 - example: 1636669297674 - example: - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - details: - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists in\ - \ Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists in\ - \ Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists in\ - \ Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ + test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + enabled: true + identifier: policyset-1 + name: Production Policies + org_id: test-org + project_id: test-project status: error - enabled: true - identifier: policyset-1 - name: Production Policies + type: pipeline + updated: 1636669297674 + entity: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + entity_metadata: 7bbca5d4-e9f2-4955-9b2a-019ec4d3645e + id: 123 + input: "" org_id: test-org project_id: test-project status: error - type: pipeline - updated: 1636669297674 - EvaluationDetail2: + type: "pipeline,service" + EvaluationCounts: + required: + - error + - pass + - warning + type: object + properties: + error: + type: integer + description: Count of evaluations that have a status of 'error' + format: int64 + example: 2877065535170142137 + pass: + type: integer + description: Count of evaluations that have a status of 'pass' + format: int64 + example: 6448843135629816731 + warning: + type: integer + description: Count of evaluations that have a status of 'warning' + format: int64 + example: 5349812220259163158 + description: Evaluation counts by status + example: + error: 3723090062830688588 + pass: 6135952462759855154 + warning: 9199932466817366069 + EvaluationDetail: required: + - account_id + - action + - created - details + - enabled + - entity_selector + - identifier + - name + - org_id + - project_id - status + - type + - updated type: object properties: account_id: @@ -8658,6 +11728,50 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" + git_default_branch_update_error: + explanation: "File with given filepath [file.rego] already exists\ + \ in Github, thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in Github\ + \ repository [rego-demo] for the given filepath and branch [main]." + git_default_branch_updated: 1636669297674 + git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_file_url: "" + git_path: .harness/policy.rego + git_repo: "github.com/org/repo,omitempty" + identifier: policy-1 + name: Pipeline Approval + org_id: test-org + project_id: test-project + rego: "" + updated: 1636669297674 + status: error + - deny_messages: + - deployment stage 'example-stage' does not have a HarnessApproval step + - deployment stage 'example-stage' has step 'run-script' that is forbidden + type 'ShellScript' + error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ + test" + output: |- + { + "deny": [ + "deployment stage 'deploy' does not have a HarnessApproval step" + ], + "stages_with_approval": [] + } + policy: + account_id: eBqAoNchMLKigC_qZ5EdC + created: 1636669297674 + git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_connector_ref: "." + git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8696,6 +11810,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists\ \ in Github, thus couldn't create a new file" @@ -8785,6 +11902,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists in\ \ Github, thus couldn't create a new file" @@ -8823,82 +11943,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists in\ - \ Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main - git_default_branch_update_error: - explanation: "File with given filepath [file.rego] already exists in\ - \ Github, thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github\ - \ repository [rego-demo] for the given filepath and branch [main]." - git_default_branch_updated: 1636669297674 - git_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_file_url: "" - git_path: .harness/policy.rego - git_repo: "github.com/org/repo,omitempty" - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - updated: 1636669297674 - status: error - - deny_messages: - - deployment stage 'example-stage' does not have a HarnessApproval step - - deployment stage 'example-stage' has step 'run-script' that is forbidden - type 'ShellScript' - error: "policy.rego:25: rego_parse_error: non-terminated string m == \"\ - test" - output: |- - { - "deny": [ - "deployment stage 'deploy' does not have a HarnessApproval step" - ], - "stages_with_approval": [] - } - policy: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d - git_connector_ref: "." - git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists in\ \ Github, thus couldn't create a new file" @@ -8926,104 +11973,51 @@ components: status: error type: pipeline updated: 1636669297674 - GitErrorResult: - required: - - explanation - - hint - - message + GenerateRequestBody: type: object properties: - explanation: - type: string - description: the explanation of the error - example: "File with given filepath [file.rego] already exists in Github,\ - \ thus couldn't create a new file" - hint: + policyData: type: string - description: the hint on how to resolve the error - example: "Please check if there's already a file [file.rego] in Github repository\ - \ [rego-demo] for the given filepath and branch [main]." - message: + description: policySample Data + example: encryptedJsonData example + query: type: string - description: the message is a human-readable explanation specific to this - occurrence of the problem - example: "Please check if there's already a file [file.rego] in Github repository\ - \ [rego-demo] for the given filepath and branch [main]." + description: Text query + example: query example example: - explanation: "File with given filepath [file.rego] already exists in Github,\ - \ thus couldn't create a new file" - hint: "Please check if there's already a file [file.rego] in Github repository\ - \ [rego-demo] for the given filepath and branch [main]." - message: "Please check if there's already a file [file.rego] in Github repository\ - \ [rego-demo] for the given filepath and branch [main]." - LinkedPolicy: + policyData: encryptedJsonData example + query: query example + GitErrorResult: required: - - account_id - - identifier - - name - - org_id - - project_id - - severity + - explanation + - hint + - message type: object - properties: - account_id: - type: string - description: Harness account ID associated with this policy - example: eBqAoNchMLKigC_qZ5EdC - default: "" - created: - type: integer - description: Time the policy was created - format: int64 - example: 1636669297674 - identifier: - minLength: 1 - type: string - description: identifier of the policy - example: policy-1 - name: - minLength: 1 - type: string - description: Name of the policy - example: Pipeline Approval - org_id: - type: string - description: Harness organization ID associated with this policy - example: test-org - default: "" - project_id: + properties: + explanation: type: string - description: Harness project ID associated with this policy - example: test-project - default: "" - rego: - minLength: 1 + description: the explanation of the error + example: "File with given filepath [file.rego] already exists in Github,\ + \ thus couldn't create a new file" + hint: type: string - description: Rego that defines the policy - example: "" - severity: + description: the hint on how to resolve the error + example: "Please check if there's already a file [file.rego] in Github repository\ + \ [rego-demo] for the given filepath and branch [main]." + message: type: string - description: The severity of this policy in this context - example: warning - enum: - - warning - - error - updated: - type: integer - description: Time the policy was last updated - format: int64 - example: 1636669297674 + description: the message is a human-readable explanation specific to this + occurrence of the problem + example: "Please check if there's already a file [file.rego] in Github repository\ + \ [rego-demo] for the given filepath and branch [main]." example: - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - LinkedPolicy2: + explanation: "File with given filepath [file.rego] already exists in Github,\ + \ thus couldn't create a new file" + hint: "Please check if there's already a file [file.rego] in Github repository\ + \ [rego-demo] for the given filepath and branch [main]." + message: "Please check if there's already a file [file.rego] in Github repository\ + \ [rego-demo] for the given filepath and branch [main]." + LinkedPolicy: required: - account_id - created @@ -9149,6 +12143,20 @@ components: description: "The default branch, the service pulls in changes from from\ \ this branch for policy evaluation" example: main + git_default_branch_commit_sha: + type: string + description: The commit sha of the commit that last effected the file in + the default branch + example: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: + type: string + description: "The file id of the file in the default branch, may be empty\ + \ for bitbucket files" + example: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: + type: string + description: The url of the file in the default branch + example: "" git_default_branch_update_error: $ref: '#/components/schemas/GitErrorResult' git_default_branch_updated: @@ -9159,7 +12167,7 @@ components: example: 1636669297674 git_file_id: type: string - description: The file if od the bile being updated + description: "The file id of the file, may be empty for bitbucket files" example: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_file_url: type: string @@ -9209,6 +12217,9 @@ components: git_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d git_connector_ref: "." git_default_branch: main + git_default_branch_commit_sha: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_id: 1369b45c20fc685113adcfd1a08a914180ff3c0d + git_default_branch_file_url: "" git_default_branch_update_error: explanation: "File with given filepath [file.rego] already exists in Github,\ \ thus couldn't create a new file" @@ -9258,6 +12269,42 @@ components: type: string description: The type of entity illustrated in this example example: pipeline + variables: + type: array + description: The list of substitutable variables in the policy example + example: + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + items: + $ref: '#/components/schemas/Variable' description: Example policies and input example: desc: This is a pipeline example @@ -9267,6 +12314,37 @@ components: package test deny["should say hello world"] {input.message != "world"} type: pipeline + variables: + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval + - default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval PolicyHealth: required: - total_evaluation_count @@ -9280,170 +12358,66 @@ components: type: integer description: Total number of evaluations that have occurred format: int64 - example: 3106114819850014595 + example: 1075694761621855595 total_evaluation_entity_count: $ref: '#/components/schemas/EvaluationCounts' total_policy_count: type: integer description: Total number of policies stored format: int64 - example: 260032344239716986 + example: 1440586742128385263 total_policy_set_count: type: integer description: Total number of policy sets stored format: int64 - example: 8273115386678935454 + example: 333280456831607697 total_policy_set_entity_count: type: object additionalProperties: type: integer format: int64 - example: 1071228818264538870 + example: 7529806932165301472 description: Total number of policy sets by type example: - Nihil beatae ut.: 3419870533551795433 - Officiis eum.: 2401905417790433514 - Ut et.: 1271161779457622586 + Et aperiam eos laboriosam.: 4158539768694987722 + Molestiae quo.: 1213808792919247442 + Unde enim molestiae soluta nihil nihil.: 3594044833535790815 description: Policy health metrics example: - total_evaluation_count: 1514701763360421536 + total_evaluation_count: 4574813677344614924 total_evaluation_entity_count: - error: 4962770580155356801 - pass: 1838564234748219477 - warning: 6712404284550845579 - total_policy_count: 8782150527953946519 - total_policy_set_count: 137249694436592402 + error: 76024433486172609 + pass: 4127438089508318555 + warning: 511376631733875378 + total_policy_count: 2031060111220529933 + total_policy_set_count: 1607032054773154549 total_policy_set_entity_count: - Sequi asperiores molestiae quia architecto reprehenderit.: 8689723557954075770 - Voluptate eos.: 5766037194807765246 - PolicySet: + Autem sit assumenda error.: 6741000365707137320 + Optio ipsam et et asperiores libero cupiditate.: 9123841955658149183 + PolicySample: required: - - account_id - - action - - created - - enabled - - identifier - - name - - org_id - - project_id - - type - - updated + - policy + - status type: object properties: - account_id: - type: string - description: Harness account ID associated with this policy set - example: eBqAoNchMLKigC_qZ5EdC - default: "" - action: - minLength: 1 - type: string - description: Action that triggers the policy set - example: onrun - created: - type: integer - description: Time the policy set was created - format: int64 - example: 1636669297674 - description: - type: string - description: Description of the policy set - example: Captures critical production policies - enabled: - type: boolean - description: Only enabled policy sets are evaluated when evaluating by type/action - example: true - identifier: - minLength: 1 - type: string - description: Identifier of the policy set - example: policyset-1 - name: - minLength: 1 - type: string - description: Name of the policy set - example: Production Policies - org_id: - type: string - description: Harness organization ID associated with this policy set - example: test-org - default: "" - policies: - type: array - description: Policies linked to this policy set - example: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - items: - $ref: '#/components/schemas/LinkedPolicy' - project_id: + policy: type: string - description: Harness project ID associated with this policy set - example: test-project - default: "" - type: - minLength: 1 + description: Build identifier + example: policy example + status: type: string - description: Type of input suitable for the policy set - example: pipeline - updated: - type: integer - description: Time the policy set was last updated - format: int64 - example: 1636669297674 + description: status + example: SUCCESS example: - account_id: eBqAoNchMLKigC_qZ5EdC - action: onrun - created: 1636669297674 - description: Captures critical production policies - enabled: true - identifier: policyset-1 - name: Production Policies - org_id: test-org - policies: - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - - account_id: eBqAoNchMLKigC_qZ5EdC - created: 1636669297674 - identifier: policy-1 - name: Pipeline Approval - org_id: test-org - project_id: test-project - rego: "" - severity: warning - updated: 1636669297674 - project_id: test-project - type: pipeline - updated: 1636669297674 - PolicySet2: + policy: policy example + status: SUCCESS + PolicySet: required: - account_id - action - created - enabled + - entity_selector - identifier - name - org_id @@ -9475,6 +12449,14 @@ components: type: boolean description: Only enabled policy sets are evaluated when evaluating by type/action example: true + entity_selector: + type: string + description: A string enum value which determines which entities the policy + set applies to during evaluation + example: all_entities_in_scope + enum: + - all_entities_in_scope + - all_entities_in_resource_groups identifier: minLength: 1 type: string @@ -9522,12 +12504,31 @@ components: severity: warning updated: 1636669297674 items: - $ref: '#/components/schemas/LinkedPolicy2' + $ref: '#/components/schemas/LinkedPolicy' project_id: type: string description: Harness project ID associated with this policy set example: test-project default: "" + resource_groups: + type: array + description: The groups of resources that this policy set should be applied + to + example: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + items: + $ref: '#/components/schemas/ResourceGroup' type: minLength: 1 type: string @@ -9544,6 +12545,7 @@ components: created: 1636669297674 description: Captures critical production policies enabled: true + entity_selector: all_entities_in_scope identifier: policyset-1 name: Production Policies org_id: test-org @@ -9585,8 +12587,104 @@ components: severity: warning updated: 1636669297674 project_id: test-project + resource_groups: + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. + - account_id: Saepe aut soluta ut quia. + created: 6663809881773907149 + identifier: Quia vero a ut nihil. + name: Veniam quisquam quasi ut sint. + org_id: Excepturi saepe quos natus. + project_id: Debitis provident et. type: pipeline updated: 1636669297674 + ResourceGroup: + required: + - account_id + - created + - identifier + - name + - org_id + - project_id + type: object + properties: + account_id: + type: string + description: resource group account id + example: Reprehenderit nulla. + created: + type: integer + description: resource group timestamp + format: int64 + example: 3389164250940484280 + identifier: + type: string + description: resource group identifier + example: Ullam sunt ea molestiae. + name: + type: string + description: resource group name + example: Eaque numquam quia velit nesciunt nobis quas. + org_id: + type: string + description: resource group org id + example: Est dolor non dolores tempore et. + project_id: + type: string + description: resource group project identifier + example: Nisi ab. + example: + account_id: Aut modi. + created: 3940677915990648385 + identifier: Qui perferendis autem hic alias unde laudantium. + name: Aut tempore eveniet rem. + org_id: Hic incidunt suscipit porro. + project_id: Sit ex fugiat occaecati animi recusandae. + ResourceGroupIdentifier: + required: + - account_id + - identifier + - org_id + - project_id + type: object + properties: + account_id: + type: string + description: resource group account id + example: Ducimus eligendi animi quia cum. + identifier: + type: string + description: resource group identifier + example: Laboriosam officiis et tempore corrupti. + org_id: + type: string + description: resource group org id + example: Excepturi quis. + project_id: + type: string + description: resource group project identifier + example: Et quis eius quidem velit. + example: + account_id: Voluptatem labore nam quis. + identifier: Eius qui. + org_id: Dolorem et fugit nobis minus illum iure. + project_id: Dolore aut libero quaerat. ServiceVersion: required: - commit @@ -9638,6 +12736,15 @@ components: type: boolean description: Only enabled policy sets are evaluated when evaluating by type/action example: true + entity_selector: + type: string + description: "A string enum value which determines which entities the policy\ + \ set applies to during evaluation. This feature is not available for\ + \ all accounts, Contact support if you wish to have it enabled." + example: all_entities_in_scope + enum: + - all_entities_in_scope + - all_entities_in_resource_groups name: type: string description: Name of the policy set @@ -9646,16 +12753,37 @@ components: type: array description: Policies linked to this policy set example: - - identifier: policy-1 - severity: warning - - identifier: policy-1 - severity: warning - identifier: policy-1 severity: warning - identifier: policy-1 severity: warning items: $ref: '#/components/schemas/Linkedpolicyidentifier' + resource_groups: + type: array + description: "Resource groups that contain the resources that this policy\ + \ set should be evaluated for. Resource groups are not supported for flag\ + \ or custom policy sets. This feature is not available for all accounts,\ + \ Contact support if you wish to have it enabled." + example: + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. + items: + $ref: '#/components/schemas/ResourceGroupIdentifier' type: type: string description: Type of input suitable for the policy set @@ -9664,15 +12792,77 @@ components: action: onrun description: Captures critical production policies enabled: true + entity_selector: all_entities_in_resource_groups name: Production Policies policies: - identifier: policy-1 severity: warning - identifier: policy-1 severity: warning - - identifier: policy-1 - severity: warning + resource_groups: + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. + - account_id: In repudiandae et quidem possimus ipsum. + identifier: Numquam rem quia. + org_id: Possimus praesentium sint veniam eos. + project_id: Sunt animi ipsa. type: pipeline + Variable: + type: object + properties: + default: + type: array + description: The values that are selected by default + example: + - JiraUpdate + - HarnessApproval + items: + type: string + example: Molestiae qui ut. + desc: + type: string + description: Longer description of the variable to substitute + example: The required steps that the policy enforces + id: + type: string + description: The id of the variable to substitute in the rego + example: requiredsteps + name: + type: string + description: The human readable name of the variable to substitute in the + rego + example: Required Steps + type: + type: string + description: The variable type + example: selectOne + enum: + - text + - textMultiple + - selectOne + - selectMultiple + values: + type: array + description: Pre populated sample values to substitute the variable with + example: + - JiraUpdate + - HarnessApproval + items: + type: string + example: Nihil occaecati cumque et maiores similique aut. + example: + default: + - JiraUpdate + - HarnessApproval + desc: The required steps that the policy enforces + id: requiredsteps + name: Required Steps + type: selectOne + values: + - JiraUpdate + - HarnessApproval securitySchemes: api_key_header_x-api-key: type: apiKey diff --git a/harness/policymgmt/api_aida.go b/harness/policymgmt/api_aida.go new file mode 100644 index 00000000..fded6f01 --- /dev/null +++ b/harness/policymgmt/api_aida.go @@ -0,0 +1,394 @@ + +/* + * Governance Policy Management API + * + * Read and manage OPA Governance policies, policy sets and evaluations + * + * API version: 1.2.0 + * Generated by: Swagger Codegen (https://github.com/swagger-api/swagger-codegen.git) + */ +package policymgmt + +import ( + "context" + "io/ioutil" + "net/http" + "net/url" + "strings" + "github.com/antihax/optional" +) + +// Linger please +var ( + _ context.Context +) + +type AidaApiService service +/* +AidaApiService +Describe Policy On Basis of rego + * @param ctx context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). + * @param body + * @param optional nil or *AidaApiAidaAnalyzeOpts - Optional Parameters: + * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization + * @param "AccountIdentifier" (optional.String) - Harness account ID + * @param "OrgIdentifier" (optional.String) - Harness organization ID + * @param "ProjectIdentifier" (optional.String) - Harness project ID +@return AnalyzeResponse +*/ + +type AidaApiAidaAnalyzeOpts struct { + XApiKey optional.String + AccountIdentifier optional.String + OrgIdentifier optional.String + ProjectIdentifier optional.String +} + +func (a *AidaApiService) AidaAnalyze(ctx context.Context, body AnalyzeRequestBody, localVarOptionals *AidaApiAidaAnalyzeOpts) (AnalyzeResponse, *http.Response, error) { + var ( + localVarHttpMethod = strings.ToUpper("Post") + localVarPostBody interface{} + localVarFileName string + localVarFileBytes []byte + localVarReturnValue AnalyzeResponse + ) + + // create path and map variables + localVarPath := a.client.cfg.BasePath + "/api/v1/aida/analyze" + + localVarHeaderParams := make(map[string]string) + localVarQueryParams := url.Values{} + localVarFormParams := url.Values{} + + if localVarOptionals != nil && localVarOptionals.AccountIdentifier.IsSet() { + localVarQueryParams.Add("accountIdentifier", parameterToString(localVarOptionals.AccountIdentifier.Value(), "")) + } + if localVarOptionals != nil && localVarOptionals.OrgIdentifier.IsSet() { + localVarQueryParams.Add("orgIdentifier", parameterToString(localVarOptionals.OrgIdentifier.Value(), "")) + } + if localVarOptionals != nil && localVarOptionals.ProjectIdentifier.IsSet() { + localVarQueryParams.Add("projectIdentifier", parameterToString(localVarOptionals.ProjectIdentifier.Value(), "")) + } + // to determine the Content-Type header + localVarHttpContentTypes := []string{"application/json"} + + // set Content-Type header + localVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes) + if localVarHttpContentType != "" { + localVarHeaderParams["Content-Type"] = localVarHttpContentType + } + + // to determine the Accept header + localVarHttpHeaderAccepts := []string{"application/json", "application/vnd.goa.error"} + + // set Accept header + localVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts) + if localVarHttpHeaderAccept != "" { + localVarHeaderParams["Accept"] = localVarHttpHeaderAccept + } + if localVarOptionals != nil && localVarOptionals.XApiKey.IsSet() { + localVarHeaderParams["x-api-key"] = parameterToString(localVarOptionals.XApiKey.Value(), "") + } + // body params + localVarPostBody = &body + if ctx != nil { + // API Key Authentication + if auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok { + var key string + if auth.Prefix != "" { + key = auth.Prefix + " " + auth.Key + } else { + key = auth.Key + } + localVarHeaderParams["x-api-key"] = key + + } + } + r, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes) + if err != nil { + return localVarReturnValue, nil, err + } + + localVarHttpResponse, err := a.client.callAPI(r) + if err != nil || localVarHttpResponse == nil { + return localVarReturnValue, localVarHttpResponse, err + } + + localVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body) + localVarHttpResponse.Body.Close() + if err != nil { + return localVarReturnValue, localVarHttpResponse, err + } + + if localVarHttpResponse.StatusCode < 300 { + // If we succeed, return the data, otherwise pass on to decode error. + err = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err == nil { + return localVarReturnValue, localVarHttpResponse, err + } + } + + if localVarHttpResponse.StatusCode >= 300 { + newErr := GenericSwaggerError{ + body: localVarBody, + error: localVarHttpResponse.Status, + } + if localVarHttpResponse.StatusCode == 200 { + var v AnalyzeResponse + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 400 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 401 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 403 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 404 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 500 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 502 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + return localVarReturnValue, localVarHttpResponse, newErr + } + + return localVarReturnValue, localVarHttpResponse, nil +} +/* +AidaApiService +Generate Policy On Basis of free Text + * @param ctx context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). + * @param body + * @param optional nil or *AidaApiAidaGenerateOpts - Optional Parameters: + * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization + * @param "AccountIdentifier" (optional.String) - Harness account ID + * @param "OrgIdentifier" (optional.String) - Harness organization ID + * @param "ProjectIdentifier" (optional.String) - Harness project ID +@return PolicySample +*/ + +type AidaApiAidaGenerateOpts struct { + XApiKey optional.String + AccountIdentifier optional.String + OrgIdentifier optional.String + ProjectIdentifier optional.String +} + +func (a *AidaApiService) AidaGenerate(ctx context.Context, body GenerateRequestBody, localVarOptionals *AidaApiAidaGenerateOpts) (PolicySample, *http.Response, error) { + var ( + localVarHttpMethod = strings.ToUpper("Post") + localVarPostBody interface{} + localVarFileName string + localVarFileBytes []byte + localVarReturnValue PolicySample + ) + + // create path and map variables + localVarPath := a.client.cfg.BasePath + "/api/v1/aida/generate" + + localVarHeaderParams := make(map[string]string) + localVarQueryParams := url.Values{} + localVarFormParams := url.Values{} + + if localVarOptionals != nil && localVarOptionals.AccountIdentifier.IsSet() { + localVarQueryParams.Add("accountIdentifier", parameterToString(localVarOptionals.AccountIdentifier.Value(), "")) + } + if localVarOptionals != nil && localVarOptionals.OrgIdentifier.IsSet() { + localVarQueryParams.Add("orgIdentifier", parameterToString(localVarOptionals.OrgIdentifier.Value(), "")) + } + if localVarOptionals != nil && localVarOptionals.ProjectIdentifier.IsSet() { + localVarQueryParams.Add("projectIdentifier", parameterToString(localVarOptionals.ProjectIdentifier.Value(), "")) + } + // to determine the Content-Type header + localVarHttpContentTypes := []string{"application/json"} + + // set Content-Type header + localVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes) + if localVarHttpContentType != "" { + localVarHeaderParams["Content-Type"] = localVarHttpContentType + } + + // to determine the Accept header + localVarHttpHeaderAccepts := []string{"application/json", "application/vnd.goa.error"} + + // set Accept header + localVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts) + if localVarHttpHeaderAccept != "" { + localVarHeaderParams["Accept"] = localVarHttpHeaderAccept + } + if localVarOptionals != nil && localVarOptionals.XApiKey.IsSet() { + localVarHeaderParams["x-api-key"] = parameterToString(localVarOptionals.XApiKey.Value(), "") + } + // body params + localVarPostBody = &body + if ctx != nil { + // API Key Authentication + if auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok { + var key string + if auth.Prefix != "" { + key = auth.Prefix + " " + auth.Key + } else { + key = auth.Key + } + localVarHeaderParams["x-api-key"] = key + + } + } + r, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes) + if err != nil { + return localVarReturnValue, nil, err + } + + localVarHttpResponse, err := a.client.callAPI(r) + if err != nil || localVarHttpResponse == nil { + return localVarReturnValue, localVarHttpResponse, err + } + + localVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body) + localVarHttpResponse.Body.Close() + if err != nil { + return localVarReturnValue, localVarHttpResponse, err + } + + if localVarHttpResponse.StatusCode < 300 { + // If we succeed, return the data, otherwise pass on to decode error. + err = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err == nil { + return localVarReturnValue, localVarHttpResponse, err + } + } + + if localVarHttpResponse.StatusCode >= 300 { + newErr := GenericSwaggerError{ + body: localVarBody, + error: localVarHttpResponse.Status, + } + if localVarHttpResponse.StatusCode == 200 { + var v PolicySample + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 400 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 401 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 403 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 404 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 500 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 502 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + return localVarReturnValue, localVarHttpResponse, newErr + } + + return localVarReturnValue, localVarHttpResponse, nil +} diff --git a/harness/policymgmt/api_dashboard.go b/harness/policymgmt/api_dashboard.go index 99665419..0a77cb93 100644 --- a/harness/policymgmt/api_dashboard.go +++ b/harness/policymgmt/api_dashboard.go @@ -33,6 +33,7 @@ Get metrics about policies, policy sets and evaluations * @param "AccountIdentifier" (optional.String) - Harness account ID * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID + * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization @return DashboardMetrics */ @@ -41,6 +42,7 @@ type DashboardApiDashboardMetricsOpts struct { AccountIdentifier optional.String OrgIdentifier optional.String ProjectIdentifier optional.String + XApiKey optional.String } func (a *DashboardApiService) DashboardMetrics(ctx context.Context, localVarOptionals *DashboardApiDashboardMetricsOpts) (DashboardMetrics, *http.Response, error) { @@ -88,6 +90,22 @@ func (a *DashboardApiService) DashboardMetrics(ctx context.Context, localVarOpti if localVarHttpHeaderAccept != "" { localVarHeaderParams["Accept"] = localVarHttpHeaderAccept } + if localVarOptionals != nil && localVarOptionals.XApiKey.IsSet() { + localVarHeaderParams["x-api-key"] = parameterToString(localVarOptionals.XApiKey.Value(), "") + } + if ctx != nil { + // API Key Authentication + if auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok { + var key string + if auth.Prefix != "" { + key = auth.Prefix + " " + auth.Key + } else { + key = auth.Key + } + localVarHeaderParams["x-api-key"] = key + + } + } r, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes) if err != nil { return localVarReturnValue, nil, err diff --git a/harness/policymgmt/api_evaluate.go b/harness/policymgmt/api_evaluate.go index 3b8a28a5..a3c28a8f 100644 --- a/harness/policymgmt/api_evaluate.go +++ b/harness/policymgmt/api_evaluate.go @@ -30,6 +30,7 @@ Evaluate arbitrary rego * @param ctx context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). * @param body * @param optional nil or *EvaluateApiEvaluateEvaluateOpts - Optional Parameters: + * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization * @param "AccountIdentifier" (optional.String) - Harness account ID * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID @@ -37,6 +38,7 @@ Evaluate arbitrary rego */ type EvaluateApiEvaluateEvaluateOpts struct { + XApiKey optional.String AccountIdentifier optional.String OrgIdentifier optional.String ProjectIdentifier optional.String @@ -84,8 +86,24 @@ func (a *EvaluateApiService) EvaluateEvaluate(ctx context.Context, body Evaluate if localVarHttpHeaderAccept != "" { localVarHeaderParams["Accept"] = localVarHttpHeaderAccept } + if localVarOptionals != nil && localVarOptionals.XApiKey.IsSet() { + localVarHeaderParams["x-api-key"] = parameterToString(localVarOptionals.XApiKey.Value(), "") + } // body params localVarPostBody = &body + if ctx != nil { + // API Key Authentication + if auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok { + var key string + if auth.Prefix != "" { + key = auth.Prefix + " " + auth.Key + } else { + key = auth.Key + } + localVarHeaderParams["x-api-key"] = key + + } + } r, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes) if err != nil { return localVarReturnValue, nil, err @@ -204,6 +222,7 @@ Evaluate policy sets by ID * @param "PrincipalIdentifier" (optional.String) - Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType' * @param "PrincipalType" (optional.String) - Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier' * @param "UserIdentifier" (optional.String) - Deprecated: Please use 'principalIdentifier' and 'principalType' instead + * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization @return Evaluation */ @@ -216,6 +235,7 @@ type EvaluateApiEvaluateEvaluateByIdsOpts struct { PrincipalIdentifier optional.String PrincipalType optional.String UserIdentifier optional.String + XApiKey optional.String } func (a *EvaluateApiService) EvaluateEvaluateByIds(ctx context.Context, ids string, localVarOptionals *EvaluateApiEvaluateEvaluateByIdsOpts) (Evaluation, *http.Response, error) { @@ -279,6 +299,22 @@ func (a *EvaluateApiService) EvaluateEvaluateByIds(ctx context.Context, ids stri if localVarHttpHeaderAccept != "" { localVarHeaderParams["Accept"] = localVarHttpHeaderAccept } + if localVarOptionals != nil && localVarOptionals.XApiKey.IsSet() { + localVarHeaderParams["x-api-key"] = parameterToString(localVarOptionals.XApiKey.Value(), "") + } + if ctx != nil { + // API Key Authentication + if auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok { + var key string + if auth.Prefix != "" { + key = auth.Prefix + " " + auth.Key + } else { + key = auth.Key + } + localVarHeaderParams["x-api-key"] = key + + } + } r, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes) if err != nil { return localVarReturnValue, nil, err @@ -398,6 +434,7 @@ Evaluate all policy sets of a specified type * @param "PrincipalIdentifier" (optional.String) - Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType' * @param "PrincipalType" (optional.String) - Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier' * @param "UserIdentifier" (optional.String) - Deprecated: Please use 'principalIdentifier' and 'principalType' instead + * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization @return Evaluation */ @@ -410,6 +447,7 @@ type EvaluateApiEvaluateEvaluateByTypeOpts struct { PrincipalIdentifier optional.String PrincipalType optional.String UserIdentifier optional.String + XApiKey optional.String } func (a *EvaluateApiService) EvaluateEvaluateByType(ctx context.Context, type_ string, action string, localVarOptionals *EvaluateApiEvaluateEvaluateByTypeOpts) (Evaluation, *http.Response, error) { @@ -477,6 +515,22 @@ func (a *EvaluateApiService) EvaluateEvaluateByType(ctx context.Context, type_ s if localVarHttpHeaderAccept != "" { localVarHeaderParams["Accept"] = localVarHttpHeaderAccept } + if localVarOptionals != nil && localVarOptionals.XApiKey.IsSet() { + localVarHeaderParams["x-api-key"] = parameterToString(localVarOptionals.XApiKey.Value(), "") + } + if ctx != nil { + // API Key Authentication + if auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok { + var key string + if auth.Prefix != "" { + key = auth.Prefix + " " + auth.Key + } else { + key = auth.Key + } + localVarHeaderParams["x-api-key"] = key + + } + } r, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes) if err != nil { return localVarReturnValue, nil, err @@ -581,3 +635,199 @@ func (a *EvaluateApiService) EvaluateEvaluateByType(ctx context.Context, type_ s return localVarReturnValue, localVarHttpResponse, nil } +/* +EvaluateApiService evaluate-by-type-check evaluate +Returns true if there are policies to evaluate for the given type, action and acc/org/proj scope. + * @param ctx context.Context - for authentication, logging, cancellation, deadlines, tracing, etc. Passed from http.Request or context.Background(). + * @param type_ Type of entity under evaluation + * @param action Action that triggered the evaluation + * @param optional nil or *EvaluateApiEvaluateEvaluateByTypeCheckOpts - Optional Parameters: + * @param "AccountIdentifier" (optional.String) - Harness account ID + * @param "OrgIdentifier" (optional.String) - Harness organization ID + * @param "ProjectIdentifier" (optional.String) - Harness project ID + * @param "Entity" (optional.String) - User-supplied global identifier of the entity under evaluation + * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization +@return EvaluateByTypeCheckResponseBody +*/ + +type EvaluateApiEvaluateEvaluateByTypeCheckOpts struct { + AccountIdentifier optional.String + OrgIdentifier optional.String + ProjectIdentifier optional.String + Entity optional.String + XApiKey optional.String +} + +func (a *EvaluateApiService) EvaluateEvaluateByTypeCheck(ctx context.Context, type_ string, action string, localVarOptionals *EvaluateApiEvaluateEvaluateByTypeCheckOpts) (EvaluateByTypeCheckResponseBody, *http.Response, error) { + var ( + localVarHttpMethod = strings.ToUpper("Get") + localVarPostBody interface{} + localVarFileName string + localVarFileBytes []byte + localVarReturnValue EvaluateByTypeCheckResponseBody + ) + + // create path and map variables + localVarPath := a.client.cfg.BasePath + "/api/v1/evaluate-by-type-check" + + localVarHeaderParams := make(map[string]string) + localVarQueryParams := url.Values{} + localVarFormParams := url.Values{} + if strlen(type_) < 1 { + return localVarReturnValue, nil, reportError("type_ must have at least 1 elements") + } + if strlen(action) < 1 { + return localVarReturnValue, nil, reportError("action must have at least 1 elements") + } + + if localVarOptionals != nil && localVarOptionals.AccountIdentifier.IsSet() { + localVarQueryParams.Add("accountIdentifier", parameterToString(localVarOptionals.AccountIdentifier.Value(), "")) + } + if localVarOptionals != nil && localVarOptionals.OrgIdentifier.IsSet() { + localVarQueryParams.Add("orgIdentifier", parameterToString(localVarOptionals.OrgIdentifier.Value(), "")) + } + if localVarOptionals != nil && localVarOptionals.ProjectIdentifier.IsSet() { + localVarQueryParams.Add("projectIdentifier", parameterToString(localVarOptionals.ProjectIdentifier.Value(), "")) + } + localVarQueryParams.Add("type", parameterToString(type_, "")) + localVarQueryParams.Add("action", parameterToString(action, "")) + if localVarOptionals != nil && localVarOptionals.Entity.IsSet() { + localVarQueryParams.Add("entity", parameterToString(localVarOptionals.Entity.Value(), "")) + } + // to determine the Content-Type header + localVarHttpContentTypes := []string{} + + // set Content-Type header + localVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes) + if localVarHttpContentType != "" { + localVarHeaderParams["Content-Type"] = localVarHttpContentType + } + + // to determine the Accept header + localVarHttpHeaderAccepts := []string{"application/json", "application/vnd.goa.error"} + + // set Accept header + localVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts) + if localVarHttpHeaderAccept != "" { + localVarHeaderParams["Accept"] = localVarHttpHeaderAccept + } + if localVarOptionals != nil && localVarOptionals.XApiKey.IsSet() { + localVarHeaderParams["x-api-key"] = parameterToString(localVarOptionals.XApiKey.Value(), "") + } + if ctx != nil { + // API Key Authentication + if auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok { + var key string + if auth.Prefix != "" { + key = auth.Prefix + " " + auth.Key + } else { + key = auth.Key + } + localVarHeaderParams["x-api-key"] = key + + } + } + r, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes) + if err != nil { + return localVarReturnValue, nil, err + } + + localVarHttpResponse, err := a.client.callAPI(r) + if err != nil || localVarHttpResponse == nil { + return localVarReturnValue, localVarHttpResponse, err + } + + localVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body) + localVarHttpResponse.Body.Close() + if err != nil { + return localVarReturnValue, localVarHttpResponse, err + } + + if localVarHttpResponse.StatusCode < 300 { + // If we succeed, return the data, otherwise pass on to decode error. + err = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err == nil { + return localVarReturnValue, localVarHttpResponse, err + } + } + + if localVarHttpResponse.StatusCode >= 300 { + newErr := GenericSwaggerError{ + body: localVarBody, + error: localVarHttpResponse.Status, + } + if localVarHttpResponse.StatusCode == 200 { + var v EvaluateByTypeCheckResponseBody + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 400 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 401 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 403 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 404 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 500 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + if localVarHttpResponse.StatusCode == 502 { + var v ModelError + err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); + if err != nil { + newErr.error = err.Error() + return localVarReturnValue, localVarHttpResponse, newErr + } + newErr.model = v + return localVarReturnValue, localVarHttpResponse, newErr + } + return localVarReturnValue, localVarHttpResponse, newErr + } + + return localVarReturnValue, localVarHttpResponse, nil +} diff --git a/harness/policymgmt/api_evaluations.go b/harness/policymgmt/api_evaluations.go index b02182fe..37e94aa0 100644 --- a/harness/policymgmt/api_evaluations.go +++ b/harness/policymgmt/api_evaluations.go @@ -34,6 +34,7 @@ Find an evaluation by ID * @param "AccountIdentifier" (optional.String) - Harness account ID * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID + * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization @return Evaluation */ @@ -41,6 +42,7 @@ type EvaluationsApiEvaluationsFindOpts struct { AccountIdentifier optional.String OrgIdentifier optional.String ProjectIdentifier optional.String + XApiKey optional.String } func (a *EvaluationsApiService) EvaluationsFind(ctx context.Context, id int64, localVarOptionals *EvaluationsApiEvaluationsFindOpts) (Evaluation, *http.Response, error) { @@ -86,6 +88,22 @@ func (a *EvaluationsApiService) EvaluationsFind(ctx context.Context, id int64, l if localVarHttpHeaderAccept != "" { localVarHeaderParams["Accept"] = localVarHttpHeaderAccept } + if localVarOptionals != nil && localVarOptionals.XApiKey.IsSet() { + localVarHeaderParams["x-api-key"] = parameterToString(localVarOptionals.XApiKey.Value(), "") + } + if ctx != nil { + // API Key Authentication + if auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok { + var key string + if auth.Prefix != "" { + key = auth.Prefix + " " + auth.Key + } else { + key = auth.Key + } + localVarHeaderParams["x-api-key"] = key + + } + } r, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes) if err != nil { return localVarReturnValue, nil, err @@ -204,8 +222,12 @@ List evaluations * @param "Type_" (optional.String) - Filter by the type associated with the evaluation * @param "Action" (optional.String) - Filter by the action associated with the evaluation * @param "LastSeen" (optional.Int64) - Retrieve results starting after this last-seen result + * @param "CreatedDateFrom" (optional.Int64) - Retrieve results created from this date + * @param "CreatedDateTo" (optional.Int64) - Retrieve results created up to this date + * @param "Status" (optional.String) - Retrieve results with these statuses * @param "IncludeChildScopes" (optional.Bool) - When true, evaluations from child scopes will be inculded in the results -@return []Evaluation2 + * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization +@return []Evaluation */ type EvaluationsApiEvaluationsListOpts struct { @@ -218,16 +240,20 @@ type EvaluationsApiEvaluationsListOpts struct { Type_ optional.String Action optional.String LastSeen optional.Int64 + CreatedDateFrom optional.Int64 + CreatedDateTo optional.Int64 + Status optional.String IncludeChildScopes optional.Bool + XApiKey optional.String } -func (a *EvaluationsApiService) EvaluationsList(ctx context.Context, localVarOptionals *EvaluationsApiEvaluationsListOpts) ([]Evaluation2, *http.Response, error) { +func (a *EvaluationsApiService) EvaluationsList(ctx context.Context, localVarOptionals *EvaluationsApiEvaluationsListOpts) ([]Evaluation, *http.Response, error) { var ( localVarHttpMethod = strings.ToUpper("Get") localVarPostBody interface{} localVarFileName string localVarFileBytes []byte - localVarReturnValue []Evaluation2 + localVarReturnValue []Evaluation ) // create path and map variables @@ -264,6 +290,15 @@ func (a *EvaluationsApiService) EvaluationsList(ctx context.Context, localVarOpt if localVarOptionals != nil && localVarOptionals.LastSeen.IsSet() { localVarQueryParams.Add("last_seen", parameterToString(localVarOptionals.LastSeen.Value(), "")) } + if localVarOptionals != nil && localVarOptionals.CreatedDateFrom.IsSet() { + localVarQueryParams.Add("created_date_from", parameterToString(localVarOptionals.CreatedDateFrom.Value(), "")) + } + if localVarOptionals != nil && localVarOptionals.CreatedDateTo.IsSet() { + localVarQueryParams.Add("created_date_to", parameterToString(localVarOptionals.CreatedDateTo.Value(), "")) + } + if localVarOptionals != nil && localVarOptionals.Status.IsSet() { + localVarQueryParams.Add("status", parameterToString(localVarOptionals.Status.Value(), "")) + } if localVarOptionals != nil && localVarOptionals.IncludeChildScopes.IsSet() { localVarQueryParams.Add("includeChildScopes", parameterToString(localVarOptionals.IncludeChildScopes.Value(), "")) } @@ -284,6 +319,22 @@ func (a *EvaluationsApiService) EvaluationsList(ctx context.Context, localVarOpt if localVarHttpHeaderAccept != "" { localVarHeaderParams["Accept"] = localVarHttpHeaderAccept } + if localVarOptionals != nil && localVarOptionals.XApiKey.IsSet() { + localVarHeaderParams["x-api-key"] = parameterToString(localVarOptionals.XApiKey.Value(), "") + } + if ctx != nil { + // API Key Authentication + if auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok { + var key string + if auth.Prefix != "" { + key = auth.Prefix + " " + auth.Key + } else { + key = auth.Key + } + localVarHeaderParams["x-api-key"] = key + + } + } r, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes) if err != nil { return localVarReturnValue, nil, err @@ -314,7 +365,7 @@ func (a *EvaluationsApiService) EvaluationsList(ctx context.Context, localVarOpt error: localVarHttpResponse.Status, } if localVarHttpResponse.StatusCode == 200 { - var v []Evaluation2 + var v []Evaluation err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); if err != nil { newErr.error = err.Error() diff --git a/harness/policymgmt/api_policies.go b/harness/policymgmt/api_policies.go index bafbacb7..f3ac9faa 100644 --- a/harness/policymgmt/api_policies.go +++ b/harness/policymgmt/api_policies.go @@ -35,7 +35,6 @@ Create a policy * @param "AccountIdentifier" (optional.String) - Harness account ID * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID - * @param "Module" (optional.String) - The module in which the resource was created, updated or deleted. Only relevant in the context of a project * @param "GitCommitMsg" (optional.String) - The commit message used in git when creating the policy * @param "GitImport" (optional.Bool) - A flag to determine if the api should try and import and existing policy from git * @param "GitBranch" (optional.String) - The git branch the policy will be created in @@ -49,7 +48,6 @@ type PoliciesApiPoliciesCreateOpts struct { AccountIdentifier optional.String OrgIdentifier optional.String ProjectIdentifier optional.String - Module optional.String GitCommitMsg optional.String GitImport optional.Bool GitBranch optional.String @@ -82,9 +80,6 @@ func (a *PoliciesApiService) PoliciesCreate(ctx context.Context, body CreateRequ if localVarOptionals != nil && localVarOptionals.ProjectIdentifier.IsSet() { localVarQueryParams.Add("projectIdentifier", parameterToString(localVarOptionals.ProjectIdentifier.Value(), "")) } - if localVarOptionals != nil && localVarOptionals.Module.IsSet() { - localVarQueryParams.Add("module", parameterToString(localVarOptionals.Module.Value(), "")) - } if localVarOptionals != nil && localVarOptionals.GitCommitMsg.IsSet() { localVarQueryParams.Add("git_commit_msg", parameterToString(localVarOptionals.GitCommitMsg.Value(), "")) } @@ -248,7 +243,6 @@ Delete a policy by identifier * @param "AccountIdentifier" (optional.String) - Harness account ID * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID - * @param "Module" (optional.String) - The module in which the resource was created, updated or deleted. Only relevant in the context of a project * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization */ @@ -257,7 +251,6 @@ type PoliciesApiPoliciesDeleteOpts struct { AccountIdentifier optional.String OrgIdentifier optional.String ProjectIdentifier optional.String - Module optional.String XApiKey optional.String } @@ -290,9 +283,6 @@ func (a *PoliciesApiService) PoliciesDelete(ctx context.Context, identifier stri if localVarOptionals != nil && localVarOptionals.ProjectIdentifier.IsSet() { localVarQueryParams.Add("projectIdentifier", parameterToString(localVarOptionals.ProjectIdentifier.Value(), "")) } - if localVarOptionals != nil && localVarOptionals.Module.IsSet() { - localVarQueryParams.Add("module", parameterToString(localVarOptionals.Module.Value(), "")) - } // to determine the Content-Type header localVarHttpContentTypes := []string{} @@ -423,6 +413,7 @@ Find a policy by identifier * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID * @param "GitBranch" (optional.String) - The git branch the policy resides in + * @param "ShowSummary" (optional.Bool) - Setting to true returns the metadata about the requested policy including the information held about the status of this policy in the default branch. git_branch is ignored as no git operation takes place. * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization @return Policy */ @@ -432,6 +423,7 @@ type PoliciesApiPoliciesFindOpts struct { OrgIdentifier optional.String ProjectIdentifier optional.String GitBranch optional.String + ShowSummary optional.Bool XApiKey optional.String } @@ -467,6 +459,9 @@ func (a *PoliciesApiService) PoliciesFind(ctx context.Context, identifier string if localVarOptionals != nil && localVarOptionals.GitBranch.IsSet() { localVarQueryParams.Add("git_branch", parameterToString(localVarOptionals.GitBranch.Value(), "")) } + if localVarOptionals != nil && localVarOptionals.ShowSummary.IsSet() { + localVarQueryParams.Add("show_summary", parameterToString(localVarOptionals.ShowSummary.Value(), "")) + } // to determine the Content-Type header localVarHttpContentTypes := []string{} @@ -818,11 +813,10 @@ Update a policy by identifier * @param "GitBaseBranch" (optional.String) - If committing to a new branch, git_base_branch tells the api which branch to base the new branch from * @param "GitBranch" (optional.String) - The git branch the policy resides in * @param "GitCommitSha" (optional.String) - The existing commit sha of the file being updated - * @param "GitFileId" (optional.String) - The existing file if od the bile being updated + * @param "GitFileId" (optional.String) - The existing file id of the file being updated, not required for bitbucket files * @param "AccountIdentifier" (optional.String) - Harness account ID * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID - * @param "Module" (optional.String) - The module in which the resource was created, updated or deleted. Only relevant in the context of a project */ @@ -837,7 +831,6 @@ type PoliciesApiPoliciesUpdateOpts struct { AccountIdentifier optional.String OrgIdentifier optional.String ProjectIdentifier optional.String - Module optional.String } func (a *PoliciesApiService) PoliciesUpdate(ctx context.Context, body UpdateRequestBody, identifier string, localVarOptionals *PoliciesApiPoliciesUpdateOpts) (*http.Response, error) { @@ -884,9 +877,6 @@ func (a *PoliciesApiService) PoliciesUpdate(ctx context.Context, body UpdateRequ if localVarOptionals != nil && localVarOptionals.ProjectIdentifier.IsSet() { localVarQueryParams.Add("projectIdentifier", parameterToString(localVarOptionals.ProjectIdentifier.Value(), "")) } - if localVarOptionals != nil && localVarOptionals.Module.IsSet() { - localVarQueryParams.Add("module", parameterToString(localVarOptionals.Module.Value(), "")) - } // to determine the Content-Type header localVarHttpContentTypes := []string{"application/json"} diff --git a/harness/policymgmt/api_policysets.go b/harness/policymgmt/api_policysets.go index eb4b5a7f..41db6ed5 100644 --- a/harness/policymgmt/api_policysets.go +++ b/harness/policymgmt/api_policysets.go @@ -35,8 +35,7 @@ Create a policy set * @param "AccountIdentifier" (optional.String) - Harness account ID * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID - * @param "Module" (optional.String) - The module in which the resource was created, updated or deleted. Only relevant in the context of a project -@return PolicySet2 +@return PolicySet */ type PolicysetsApiPolicysetsCreateOpts struct { @@ -44,16 +43,15 @@ type PolicysetsApiPolicysetsCreateOpts struct { AccountIdentifier optional.String OrgIdentifier optional.String ProjectIdentifier optional.String - Module optional.String } -func (a *PolicysetsApiService) PolicysetsCreate(ctx context.Context, body CreateRequestBody2, localVarOptionals *PolicysetsApiPolicysetsCreateOpts) (PolicySet2, *http.Response, error) { +func (a *PolicysetsApiService) PolicysetsCreate(ctx context.Context, body CreateRequestBody2, localVarOptionals *PolicysetsApiPolicysetsCreateOpts) (PolicySet, *http.Response, error) { var ( localVarHttpMethod = strings.ToUpper("Post") localVarPostBody interface{} localVarFileName string localVarFileBytes []byte - localVarReturnValue PolicySet2 + localVarReturnValue PolicySet ) // create path and map variables @@ -72,9 +70,6 @@ func (a *PolicysetsApiService) PolicysetsCreate(ctx context.Context, body Create if localVarOptionals != nil && localVarOptionals.ProjectIdentifier.IsSet() { localVarQueryParams.Add("projectIdentifier", parameterToString(localVarOptionals.ProjectIdentifier.Value(), "")) } - if localVarOptionals != nil && localVarOptionals.Module.IsSet() { - localVarQueryParams.Add("module", parameterToString(localVarOptionals.Module.Value(), "")) - } // to determine the Content-Type header localVarHttpContentTypes := []string{"application/json"} @@ -140,7 +135,7 @@ func (a *PolicysetsApiService) PolicysetsCreate(ctx context.Context, body Create error: localVarHttpResponse.Status, } if localVarHttpResponse.StatusCode == 201 { - var v PolicySet2 + var v PolicySet err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); if err != nil { newErr.error = err.Error() @@ -223,7 +218,6 @@ Delete a policy set by identifier * @param "AccountIdentifier" (optional.String) - Harness account ID * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID - * @param "Module" (optional.String) - The module in which the resource was created, updated or deleted. Only relevant in the context of a project * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization */ @@ -232,7 +226,6 @@ type PolicysetsApiPolicysetsDeleteOpts struct { AccountIdentifier optional.String OrgIdentifier optional.String ProjectIdentifier optional.String - Module optional.String XApiKey optional.String } @@ -265,9 +258,6 @@ func (a *PolicysetsApiService) PolicysetsDelete(ctx context.Context, identifier if localVarOptionals != nil && localVarOptionals.ProjectIdentifier.IsSet() { localVarQueryParams.Add("projectIdentifier", parameterToString(localVarOptionals.ProjectIdentifier.Value(), "")) } - if localVarOptionals != nil && localVarOptionals.Module.IsSet() { - localVarQueryParams.Add("module", parameterToString(localVarOptionals.Module.Value(), "")) - } // to determine the Content-Type header localVarHttpContentTypes := []string{} @@ -398,7 +388,7 @@ Find a policy set by identifier * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID * @param "XApiKey" (optional.String) - Harness PAT key used to perform authorization -@return PolicySet2 +@return PolicySet */ type PolicysetsApiPolicysetsFindOpts struct { @@ -408,13 +398,13 @@ type PolicysetsApiPolicysetsFindOpts struct { XApiKey optional.String } -func (a *PolicysetsApiService) PolicysetsFind(ctx context.Context, identifier string, localVarOptionals *PolicysetsApiPolicysetsFindOpts) (PolicySet2, *http.Response, error) { +func (a *PolicysetsApiService) PolicysetsFind(ctx context.Context, identifier string, localVarOptionals *PolicysetsApiPolicysetsFindOpts) (PolicySet, *http.Response, error) { var ( localVarHttpMethod = strings.ToUpper("Get") localVarPostBody interface{} localVarFileName string localVarFileBytes []byte - localVarReturnValue PolicySet2 + localVarReturnValue PolicySet ) // create path and map variables @@ -500,7 +490,7 @@ func (a *PolicysetsApiService) PolicysetsFind(ctx context.Context, identifier st error: localVarHttpResponse.Status, } if localVarHttpResponse.StatusCode == 200 { - var v PolicySet2 + var v PolicySet err = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get("Content-Type")); if err != nil { newErr.error = err.Error() @@ -796,7 +786,6 @@ Update a policy set by identifier * @param "AccountIdentifier" (optional.String) - Harness account ID * @param "OrgIdentifier" (optional.String) - Harness organization ID * @param "ProjectIdentifier" (optional.String) - Harness project ID - * @param "Module" (optional.String) - The module in which the resource was created, updated or deleted. Only relevant in the context of a project */ @@ -805,7 +794,6 @@ type PolicysetsApiPolicysetsUpdateOpts struct { AccountIdentifier optional.String OrgIdentifier optional.String ProjectIdentifier optional.String - Module optional.String } func (a *PolicysetsApiService) PolicysetsUpdate(ctx context.Context, body UpdateRequestBody2, identifier string, localVarOptionals *PolicysetsApiPolicysetsUpdateOpts) (*http.Response, error) { @@ -834,9 +822,6 @@ func (a *PolicysetsApiService) PolicysetsUpdate(ctx context.Context, body Update if localVarOptionals != nil && localVarOptionals.ProjectIdentifier.IsSet() { localVarQueryParams.Add("projectIdentifier", parameterToString(localVarOptionals.ProjectIdentifier.Value(), "")) } - if localVarOptionals != nil && localVarOptionals.Module.IsSet() { - localVarQueryParams.Add("module", parameterToString(localVarOptionals.Module.Value(), "")) - } // to determine the Content-Type header localVarHttpContentTypes := []string{"application/json"} diff --git a/harness/policymgmt/client.go b/harness/policymgmt/client.go index 50c4fd25..d5196899 100644 --- a/harness/policymgmt/client.go +++ b/harness/policymgmt/client.go @@ -44,6 +44,8 @@ type APIClient struct { // API Services + AidaApi *AidaApiService + DashboardApi *DashboardApiService EvaluateApi *EvaluateApiService @@ -75,6 +77,7 @@ func NewAPIClient(cfg *Configuration) *APIClient { c.common.client = c // API Services + c.AidaApi = (*AidaApiService)(&c.common) c.DashboardApi = (*DashboardApiService)(&c.common) c.EvaluateApi = (*EvaluateApiService)(&c.common) c.EvaluationsApi = (*EvaluationsApiService)(&c.common) diff --git a/harness/policymgmt/docs/AidaApi.md b/harness/policymgmt/docs/AidaApi.md new file mode 100644 index 00000000..ab7723ef --- /dev/null +++ b/harness/policymgmt/docs/AidaApi.md @@ -0,0 +1,87 @@ +# {{classname}} + +All URIs are relative to *https://app.harness.io/gateway/pm/* + +Method | HTTP request | Description +------------- | ------------- | ------------- +[**AidaAnalyze**](AidaApi.md#AidaAnalyze) | **Post** /api/v1/aida/analyze | +[**AidaGenerate**](AidaApi.md#AidaGenerate) | **Post** /api/v1/aida/generate | + +# **AidaAnalyze** +> AnalyzeResponse AidaAnalyze(ctx, body, optional) + + +Describe Policy On Basis of rego + +### Required Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **ctx** | **context.Context** | context for authentication, logging, cancellation, deadlines, tracing, etc. + **body** | [**AnalyzeRequestBody**](AnalyzeRequestBody.md)| | + **optional** | ***AidaApiAidaAnalyzeOpts** | optional parameters | nil if no parameters + +### Optional Parameters +Optional parameters are passed through a pointer to a AidaApiAidaAnalyzeOpts struct +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **accountIdentifier** | **optional.**| Harness account ID | + **orgIdentifier** | **optional.**| Harness organization ID | + **projectIdentifier** | **optional.**| Harness project ID | + **xApiKey** | **optional.**| Harness PAT key used to perform authorization | + +### Return type + +[**AnalyzeResponse**](AnalyzeResponse.md) + +### Authorization + +[api_key_header_x-api-key](../README.md#api_key_header_x-api-key), [jwt_header_Authorization](../README.md#jwt_header_Authorization) + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json, application/vnd.goa.error + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **AidaGenerate** +> PolicySample AidaGenerate(ctx, body, optional) + + +Generate Policy On Basis of free Text + +### Required Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **ctx** | **context.Context** | context for authentication, logging, cancellation, deadlines, tracing, etc. + **body** | [**GenerateRequestBody**](GenerateRequestBody.md)| | + **optional** | ***AidaApiAidaGenerateOpts** | optional parameters | nil if no parameters + +### Optional Parameters +Optional parameters are passed through a pointer to a AidaApiAidaGenerateOpts struct +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + **accountIdentifier** | **optional.**| Harness account ID | + **orgIdentifier** | **optional.**| Harness organization ID | + **projectIdentifier** | **optional.**| Harness project ID | + **xApiKey** | **optional.**| Harness PAT key used to perform authorization | + +### Return type + +[**PolicySample**](PolicySample.md) + +### Authorization + +[api_key_header_x-api-key](../README.md#api_key_header_x-api-key), [jwt_header_Authorization](../README.md#jwt_header_Authorization) + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json, application/vnd.goa.error + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + diff --git a/harness/policymgmt/docs/AnalyzeRequestBody.md b/harness/policymgmt/docs/AnalyzeRequestBody.md new file mode 100644 index 00000000..3fb918c3 --- /dev/null +++ b/harness/policymgmt/docs/AnalyzeRequestBody.md @@ -0,0 +1,10 @@ +# AnalyzeRequestBody + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**EntityType** | **string** | Type of entity on which rego is written on | [optional] [default to null] +**Rego** | **string** | Rego Policy | [optional] [default to null] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/harness/policymgmt/docs/AnalyzeResponse.md b/harness/policymgmt/docs/AnalyzeResponse.md new file mode 100644 index 00000000..9282b1ce --- /dev/null +++ b/harness/policymgmt/docs/AnalyzeResponse.md @@ -0,0 +1,10 @@ +# AnalyzeResponse + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Desc** | **string** | Build identifier | [default to null] +**Status** | **string** | status | [default to null] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/harness/policymgmt/docs/DashboardApi.md b/harness/policymgmt/docs/DashboardApi.md index dcb7496b..932f9014 100644 --- a/harness/policymgmt/docs/DashboardApi.md +++ b/harness/policymgmt/docs/DashboardApi.md @@ -27,6 +27,7 @@ Name | Type | Description | Notes **accountIdentifier** | **optional.String**| Harness account ID | **orgIdentifier** | **optional.String**| Harness organization ID | **projectIdentifier** | **optional.String**| Harness project ID | + **xApiKey** | **optional.String**| Harness PAT key used to perform authorization | ### Return type @@ -34,7 +35,7 @@ Name | Type | Description | Notes ### Authorization -[jwt_header_Authorization](../README.md#jwt_header_Authorization) +[api_key_header_x-api-key](../README.md#api_key_header_x-api-key), [jwt_header_Authorization](../README.md#jwt_header_Authorization) ### HTTP request headers diff --git a/harness/policymgmt/docs/EvaluateApi.md b/harness/policymgmt/docs/EvaluateApi.md index 574bd21e..bbe492ce 100644 --- a/harness/policymgmt/docs/EvaluateApi.md +++ b/harness/policymgmt/docs/EvaluateApi.md @@ -7,6 +7,7 @@ Method | HTTP request | Description [**EvaluateEvaluate**](EvaluateApi.md#EvaluateEvaluate) | **Post** /api/v1/evaluate | [**EvaluateEvaluateByIds**](EvaluateApi.md#EvaluateEvaluateByIds) | **Post** /api/v1/evaluate-by-ids | [**EvaluateEvaluateByType**](EvaluateApi.md#EvaluateEvaluateByType) | **Post** /api/v1/evaluate-by-type | +[**EvaluateEvaluateByTypeCheck**](EvaluateApi.md#EvaluateEvaluateByTypeCheck) | **Get** /api/v1/evaluate-by-type-check | evaluate-by-type-check evaluate # **EvaluateEvaluate** > EvaluatedPolicy EvaluateEvaluate(ctx, body, optional) @@ -30,6 +31,7 @@ Name | Type | Description | Notes **accountIdentifier** | **optional.**| Harness account ID | **orgIdentifier** | **optional.**| Harness organization ID | **projectIdentifier** | **optional.**| Harness project ID | + **xApiKey** | **optional.**| Harness PAT key used to perform authorization | ### Return type @@ -37,7 +39,7 @@ Name | Type | Description | Notes ### Authorization -[jwt_header_Authorization](../README.md#jwt_header_Authorization) +[api_key_header_x-api-key](../README.md#api_key_header_x-api-key), [jwt_header_Authorization](../README.md#jwt_header_Authorization) ### HTTP request headers @@ -73,6 +75,7 @@ Name | Type | Description | Notes **principalIdentifier** | **optional.String**| Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType' | **principalType** | **optional.String**| Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier' | **userIdentifier** | **optional.String**| Deprecated: Please use 'principalIdentifier' and 'principalType' instead | + **xApiKey** | **optional.String**| Harness PAT key used to perform authorization | ### Return type @@ -80,7 +83,7 @@ Name | Type | Description | Notes ### Authorization -[jwt_header_Authorization](../README.md#jwt_header_Authorization) +[api_key_header_x-api-key](../README.md#api_key_header_x-api-key), [jwt_header_Authorization](../README.md#jwt_header_Authorization) ### HTTP request headers @@ -118,6 +121,7 @@ Name | Type | Description | Notes **principalIdentifier** | **optional.String**| Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType' | **principalType** | **optional.String**| Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier' | **userIdentifier** | **optional.String**| Deprecated: Please use 'principalIdentifier' and 'principalType' instead | + **xApiKey** | **optional.String**| Harness PAT key used to perform authorization | ### Return type @@ -125,7 +129,49 @@ Name | Type | Description | Notes ### Authorization -[jwt_header_Authorization](../README.md#jwt_header_Authorization) +[api_key_header_x-api-key](../README.md#api_key_header_x-api-key), [jwt_header_Authorization](../README.md#jwt_header_Authorization) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json, application/vnd.goa.error + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **EvaluateEvaluateByTypeCheck** +> EvaluateByTypeCheckResponseBody EvaluateEvaluateByTypeCheck(ctx, type_, action, optional) +evaluate-by-type-check evaluate + +Returns true if there are policies to evaluate for the given type, action and acc/org/proj scope. + +### Required Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **ctx** | **context.Context** | context for authentication, logging, cancellation, deadlines, tracing, etc. + **type_** | **string**| Type of entity under evaluation | + **action** | **string**| Action that triggered the evaluation | + **optional** | ***EvaluateApiEvaluateEvaluateByTypeCheckOpts** | optional parameters | nil if no parameters + +### Optional Parameters +Optional parameters are passed through a pointer to a EvaluateApiEvaluateEvaluateByTypeCheckOpts struct +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + + + **accountIdentifier** | **optional.String**| Harness account ID | + **orgIdentifier** | **optional.String**| Harness organization ID | + **projectIdentifier** | **optional.String**| Harness project ID | + **entity** | **optional.String**| User-supplied global identifier of the entity under evaluation | + **xApiKey** | **optional.String**| Harness PAT key used to perform authorization | + +### Return type + +[**EvaluateByTypeCheckResponseBody**](EvaluateByTypeCheckResponseBody.md) + +### Authorization + +[api_key_header_x-api-key](../README.md#api_key_header_x-api-key), [jwt_header_Authorization](../README.md#jwt_header_Authorization) ### HTTP request headers diff --git a/harness/policymgmt/docs/EvaluateByTypeCheckResponseBody.md b/harness/policymgmt/docs/EvaluateByTypeCheckResponseBody.md new file mode 100644 index 00000000..591dc27e --- /dev/null +++ b/harness/policymgmt/docs/EvaluateByTypeCheckResponseBody.md @@ -0,0 +1,9 @@ +# EvaluateByTypeCheckResponseBody + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ShouldEvaluate** | **bool** | Boolean value that indicates if there are policies to evaluate for the given type, action and acc/org/proj scope. | [default to null] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/harness/policymgmt/docs/Evaluation.md b/harness/policymgmt/docs/Evaluation.md index 547b5f28..d9c170f2 100644 --- a/harness/policymgmt/docs/Evaluation.md +++ b/harness/policymgmt/docs/Evaluation.md @@ -14,7 +14,7 @@ Name | Type | Description | Notes **OrgId** | **string** | The Harness organisation in which the evaluation was performed | [default to null] **ProjectId** | **string** | The Harness project in which the evaluation was performed | [default to null] **Status** | **string** | The overall status of the evaluation indicating whether it passed | [default to null] -**Type_** | **string** | The type of the entity under evaluation | [default to null] +**Type_** | **string** | The types of the entity under evaluation | [default to null] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/harness/policymgmt/docs/EvaluationsApi.md b/harness/policymgmt/docs/EvaluationsApi.md index 41f64221..e0a079a4 100644 --- a/harness/policymgmt/docs/EvaluationsApi.md +++ b/harness/policymgmt/docs/EvaluationsApi.md @@ -29,6 +29,7 @@ Name | Type | Description | Notes **accountIdentifier** | **optional.String**| Harness account ID | **orgIdentifier** | **optional.String**| Harness organization ID | **projectIdentifier** | **optional.String**| Harness project ID | + **xApiKey** | **optional.String**| Harness PAT key used to perform authorization | ### Return type @@ -36,7 +37,7 @@ Name | Type | Description | Notes ### Authorization -[jwt_header_Authorization](../README.md#jwt_header_Authorization) +[api_key_header_x-api-key](../README.md#api_key_header_x-api-key), [jwt_header_Authorization](../README.md#jwt_header_Authorization) ### HTTP request headers @@ -46,7 +47,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **EvaluationsList** -> []Evaluation2 EvaluationsList(ctx, optional) +> []Evaluation EvaluationsList(ctx, optional) List evaluations @@ -71,15 +72,19 @@ Name | Type | Description | Notes **type_** | **optional.String**| Filter by the type associated with the evaluation | **action** | **optional.String**| Filter by the action associated with the evaluation | **lastSeen** | **optional.Int64**| Retrieve results starting after this last-seen result | + **createdDateFrom** | **optional.Int64**| Retrieve results created from this date | + **createdDateTo** | **optional.Int64**| Retrieve results created up to this date | + **status** | **optional.String**| Retrieve results with these statuses | **includeChildScopes** | **optional.Bool**| When true, evaluations from child scopes will be inculded in the results | [default to false] + **xApiKey** | **optional.String**| Harness PAT key used to perform authorization | ### Return type -[**[]Evaluation2**](Evaluation2.md) +[**[]Evaluation**](Evaluation.md) ### Authorization -[jwt_header_Authorization](../README.md#jwt_header_Authorization) +[api_key_header_x-api-key](../README.md#api_key_header_x-api-key), [jwt_header_Authorization](../README.md#jwt_header_Authorization) ### HTTP request headers diff --git a/harness/policymgmt/docs/GenerateRequestBody.md b/harness/policymgmt/docs/GenerateRequestBody.md new file mode 100644 index 00000000..68430d37 --- /dev/null +++ b/harness/policymgmt/docs/GenerateRequestBody.md @@ -0,0 +1,10 @@ +# GenerateRequestBody + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**PolicyData** | **string** | policySample Data | [optional] [default to null] +**Query** | **string** | Text query | [optional] [default to null] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/harness/policymgmt/docs/LinkedPolicy.md b/harness/policymgmt/docs/LinkedPolicy.md index 796edeb5..a0287d7c 100644 --- a/harness/policymgmt/docs/LinkedPolicy.md +++ b/harness/policymgmt/docs/LinkedPolicy.md @@ -4,14 +4,14 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **AccountId** | **string** | Harness account ID associated with this policy | -**Created** | **int64** | Time the policy was created | [optional] [default to null] +**Created** | **int64** | Time the policy was created | [default to null] **Identifier** | **string** | identifier of the policy | [default to null] **Name** | **string** | Name of the policy | [default to null] **OrgId** | **string** | Harness organization ID associated with this policy | **ProjectId** | **string** | Harness project ID associated with this policy | -**Rego** | **string** | Rego that defines the policy | [optional] [default to null] +**Rego** | **string** | Rego that defines the policy | [default to null] **Severity** | **string** | The severity of this policy in this context | [default to null] -**Updated** | **int64** | Time the policy was last updated | [optional] [default to null] +**Updated** | **int64** | Time the policy was last updated | [default to null] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/harness/policymgmt/docs/PoliciesApi.md b/harness/policymgmt/docs/PoliciesApi.md index 74311f93..700ac33b 100644 --- a/harness/policymgmt/docs/PoliciesApi.md +++ b/harness/policymgmt/docs/PoliciesApi.md @@ -32,7 +32,6 @@ Name | Type | Description | Notes **accountIdentifier** | **optional.**| Harness account ID | **orgIdentifier** | **optional.**| Harness organization ID | **projectIdentifier** | **optional.**| Harness project ID | - **module** | **optional.**| The module in which the resource was created, updated or deleted. Only relevant in the context of a project | **gitCommitMsg** | **optional.**| The commit message used in git when creating the policy | **gitImport** | **optional.**| A flag to determine if the api should try and import and existing policy from git | **gitBranch** | **optional.**| The git branch the policy will be created in | @@ -77,7 +76,6 @@ Name | Type | Description | Notes **accountIdentifier** | **optional.String**| Harness account ID | **orgIdentifier** | **optional.String**| Harness organization ID | **projectIdentifier** | **optional.String**| Harness project ID | - **module** | **optional.String**| The module in which the resource was created, updated or deleted. Only relevant in the context of a project | **xApiKey** | **optional.String**| Harness PAT key used to perform authorization | ### Return type @@ -118,6 +116,7 @@ Name | Type | Description | Notes **orgIdentifier** | **optional.String**| Harness organization ID | **projectIdentifier** | **optional.String**| Harness project ID | **gitBranch** | **optional.String**| The git branch the policy resides in | + **showSummary** | **optional.Bool**| Setting to true returns the metadata about the requested policy including the information held about the status of this policy in the default branch. git_branch is ignored as no git operation takes place. | **xApiKey** | **optional.String**| Harness PAT key used to perform authorization | ### Return type @@ -202,11 +201,10 @@ Name | Type | Description | Notes **gitBaseBranch** | **optional.**| If committing to a new branch, git_base_branch tells the api which branch to base the new branch from | **gitBranch** | **optional.**| The git branch the policy resides in | **gitCommitSha** | **optional.**| The existing commit sha of the file being updated | - **gitFileId** | **optional.**| The existing file if od the bile being updated | + **gitFileId** | **optional.**| The existing file id of the file being updated, not required for bitbucket files | **accountIdentifier** | **optional.**| Harness account ID | **orgIdentifier** | **optional.**| Harness organization ID | **projectIdentifier** | **optional.**| Harness project ID | - **module** | **optional.**| The module in which the resource was created, updated or deleted. Only relevant in the context of a project | **xApiKey** | **optional.**| Harness PAT key used to perform authorization | ### Return type diff --git a/harness/policymgmt/docs/Policy.md b/harness/policymgmt/docs/Policy.md index 2a0a2487..5b898a6f 100644 --- a/harness/policymgmt/docs/Policy.md +++ b/harness/policymgmt/docs/Policy.md @@ -8,9 +8,12 @@ Name | Type | Description | Notes **GitCommitSha** | **string** | The commit sha of the commit that last effected the file | [optional] [default to null] **GitConnectorRef** | **string** | The harness connector used for authenticating on the git provider | [optional] [default to null] **GitDefaultBranch** | **string** | The default branch, the service pulls in changes from from this branch for policy evaluation | [optional] [default to null] +**GitDefaultBranchCommitSha** | **string** | The commit sha of the commit that last effected the file in the default branch | [optional] [default to null] +**GitDefaultBranchFileId** | **string** | The file id of the file in the default branch, may be empty for bitbucket files | [optional] [default to null] +**GitDefaultBranchFileUrl** | **string** | The url of the file in the default branch | [optional] [default to null] **GitDefaultBranchUpdateError** | [***GitErrorResult**](GitErrorResult.md) | | [optional] [default to null] **GitDefaultBranchUpdated** | **int64** | The last time the service successfully pulled in changes from the default branch | [optional] [default to null] -**GitFileId** | **string** | The file if od the bile being updated | [optional] [default to null] +**GitFileId** | **string** | The file id of the file, may be empty for bitbucket files | [optional] [default to null] **GitFileUrl** | **string** | The url of the file on the fit provider | [optional] [default to null] **GitPath** | **string** | The path to the file in the git repo | [optional] [default to null] **GitRepo** | **string** | The git repo the policy resides in | [optional] [default to null] diff --git a/harness/policymgmt/docs/PolicyExample.md b/harness/policymgmt/docs/PolicyExample.md index f30709b2..adc170c5 100644 --- a/harness/policymgmt/docs/PolicyExample.md +++ b/harness/policymgmt/docs/PolicyExample.md @@ -8,6 +8,7 @@ Name | Type | Description | Notes **Name** | **string** | Example name | [default to null] **Rego** | **string** | Example rego policy | [default to null] **Type_** | **string** | The type of entity illustrated in this example | [default to null] +**Variables** | [**[]Variable**](Variable.md) | The list of substitutable variables in the policy example | [optional] [default to null] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/harness/policymgmt/docs/PolicySample.md b/harness/policymgmt/docs/PolicySample.md new file mode 100644 index 00000000..7f620b3f --- /dev/null +++ b/harness/policymgmt/docs/PolicySample.md @@ -0,0 +1,10 @@ +# PolicySample + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Policy** | **string** | Build identifier | [default to null] +**Status** | **string** | status | [default to null] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/harness/policymgmt/docs/PolicySet.md b/harness/policymgmt/docs/PolicySet.md index eb4bd593..b33734e5 100644 --- a/harness/policymgmt/docs/PolicySet.md +++ b/harness/policymgmt/docs/PolicySet.md @@ -8,11 +8,13 @@ Name | Type | Description | Notes **Created** | **int64** | Time the policy set was created | [default to null] **Description** | **string** | Description of the policy set | [optional] [default to null] **Enabled** | **bool** | Only enabled policy sets are evaluated when evaluating by type/action | [default to null] +**EntitySelector** | **string** | A string enum value which determines which entities the policy set applies to during evaluation | [default to null] **Identifier** | **string** | Identifier of the policy set | [default to null] **Name** | **string** | Name of the policy set | [default to null] **OrgId** | **string** | Harness organization ID associated with this policy set | **Policies** | [**[]LinkedPolicy**](LinkedPolicy.md) | Policies linked to this policy set | [optional] [default to null] **ProjectId** | **string** | Harness project ID associated with this policy set | +**ResourceGroups** | [**[]ResourceGroup**](ResourceGroup.md) | The groups of resources that this policy set should be applied to | [optional] [default to null] **Type_** | **string** | Type of input suitable for the policy set | [default to null] **Updated** | **int64** | Time the policy set was last updated | [default to null] diff --git a/harness/policymgmt/docs/PolicysetsApi.md b/harness/policymgmt/docs/PolicysetsApi.md index 56281941..31f30683 100644 --- a/harness/policymgmt/docs/PolicysetsApi.md +++ b/harness/policymgmt/docs/PolicysetsApi.md @@ -11,7 +11,7 @@ Method | HTTP request | Description [**PolicysetsUpdate**](PolicysetsApi.md#PolicysetsUpdate) | **Patch** /api/v1/policysets/{identifier} | # **PolicysetsCreate** -> PolicySet2 PolicysetsCreate(ctx, body, optional) +> PolicySet PolicysetsCreate(ctx, body, optional) Create a policy set @@ -32,12 +32,11 @@ Name | Type | Description | Notes **accountIdentifier** | **optional.**| Harness account ID | **orgIdentifier** | **optional.**| Harness organization ID | **projectIdentifier** | **optional.**| Harness project ID | - **module** | **optional.**| The module in which the resource was created, updated or deleted. Only relevant in the context of a project | **xApiKey** | **optional.**| Harness PAT key used to perform authorization | ### Return type -[**PolicySet2**](PolicySet2.md) +[**PolicySet**](PolicySet.md) ### Authorization @@ -72,7 +71,6 @@ Name | Type | Description | Notes **accountIdentifier** | **optional.String**| Harness account ID | **orgIdentifier** | **optional.String**| Harness organization ID | **projectIdentifier** | **optional.String**| Harness project ID | - **module** | **optional.String**| The module in which the resource was created, updated or deleted. Only relevant in the context of a project | **xApiKey** | **optional.String**| Harness PAT key used to perform authorization | ### Return type @@ -91,7 +89,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **PolicysetsFind** -> PolicySet2 PolicysetsFind(ctx, identifier, optional) +> PolicySet PolicysetsFind(ctx, identifier, optional) Find a policy set by identifier @@ -116,7 +114,7 @@ Name | Type | Description | Notes ### Return type -[**PolicySet2**](PolicySet2.md) +[**PolicySet**](PolicySet.md) ### Authorization @@ -196,7 +194,6 @@ Name | Type | Description | Notes **accountIdentifier** | **optional.**| Harness account ID | **orgIdentifier** | **optional.**| Harness organization ID | **projectIdentifier** | **optional.**| Harness project ID | - **module** | **optional.**| The module in which the resource was created, updated or deleted. Only relevant in the context of a project | **xApiKey** | **optional.**| Harness PAT key used to perform authorization | ### Return type diff --git a/harness/policymgmt/docs/ResourceGroup.md b/harness/policymgmt/docs/ResourceGroup.md new file mode 100644 index 00000000..40d51093 --- /dev/null +++ b/harness/policymgmt/docs/ResourceGroup.md @@ -0,0 +1,14 @@ +# ResourceGroup + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AccountId** | **string** | resource group account id | [default to null] +**Created** | **int64** | resource group timestamp | [default to null] +**Identifier** | **string** | resource group identifier | [default to null] +**Name** | **string** | resource group name | [default to null] +**OrgId** | **string** | resource group org id | [default to null] +**ProjectId** | **string** | resource group project identifier | [default to null] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/harness/policymgmt/docs/ResourceGroupIdentifier.md b/harness/policymgmt/docs/ResourceGroupIdentifier.md new file mode 100644 index 00000000..bc8ae66d --- /dev/null +++ b/harness/policymgmt/docs/ResourceGroupIdentifier.md @@ -0,0 +1,12 @@ +# ResourceGroupIdentifier + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AccountId** | **string** | resource group account id | [default to null] +**Identifier** | **string** | resource group identifier | [default to null] +**OrgId** | **string** | resource group org id | [default to null] +**ProjectId** | **string** | resource group project identifier | [default to null] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/harness/policymgmt/docs/UpdateRequestBody2.md b/harness/policymgmt/docs/UpdateRequestBody2.md index 1d64b743..32be7b4a 100644 --- a/harness/policymgmt/docs/UpdateRequestBody2.md +++ b/harness/policymgmt/docs/UpdateRequestBody2.md @@ -6,8 +6,10 @@ Name | Type | Description | Notes **Action** | **string** | Action that triggers the policy set | [optional] [default to null] **Description** | **string** | Description of the policy set | [optional] [default to null] **Enabled** | **bool** | Only enabled policy sets are evaluated when evaluating by type/action | [optional] [default to null] +**EntitySelector** | **string** | A string enum value which determines which entities the policy set applies to during evaluation. This feature is not available for all accounts, Contact support if you wish to have it enabled. | [optional] [default to null] **Name** | **string** | Name of the policy set | [optional] [default to null] **Policies** | [**[]Linkedpolicyidentifier**](Linkedpolicyidentifier.md) | Policies linked to this policy set | [optional] [default to null] +**ResourceGroups** | [**[]ResourceGroupIdentifier**](ResourceGroupIdentifier.md) | Resource groups that contain the resources that this policy set should be evaluated for. Resource groups are not supported for flag or custom policy sets. This feature is not available for all accounts, Contact support if you wish to have it enabled. | [optional] [default to null] **Type_** | **string** | Type of input suitable for the policy set | [optional] [default to null] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/harness/policymgmt/docs/Variable.md b/harness/policymgmt/docs/Variable.md new file mode 100644 index 00000000..914c42cb --- /dev/null +++ b/harness/policymgmt/docs/Variable.md @@ -0,0 +1,14 @@ +# Variable + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Default_** | **[]string** | The values that are selected by default | [optional] [default to null] +**Desc** | **string** | Longer description of the variable to substitute | [optional] [default to null] +**Id** | **string** | The id of the variable to substitute in the rego | [optional] [default to null] +**Name** | **string** | The human readable name of the variable to substitute in the rego | [optional] [default to null] +**Type_** | **string** | The variable type | [optional] [default to null] +**Values** | **[]string** | Pre populated sample values to substitute the variable with | [optional] [default to null] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/harness/policymgmt/model_analyze_request_body.go b/harness/policymgmt/model_analyze_request_body.go new file mode 100644 index 00000000..ad824d6c --- /dev/null +++ b/harness/policymgmt/model_analyze_request_body.go @@ -0,0 +1,16 @@ +/* + * Governance Policy Management API + * + * Read and manage OPA Governance policies, policy sets and evaluations + * + * API version: 1.2.0 + * Generated by: Swagger Codegen (https://github.com/swagger-api/swagger-codegen.git) + */ +package policymgmt + +type AnalyzeRequestBody struct { + // Type of entity on which rego is written on + EntityType string `json:"entityType,omitempty"` + // Rego Policy + Rego string `json:"rego,omitempty"` +} diff --git a/harness/policymgmt/model_analyze_response.go b/harness/policymgmt/model_analyze_response.go new file mode 100644 index 00000000..e580d3ce --- /dev/null +++ b/harness/policymgmt/model_analyze_response.go @@ -0,0 +1,16 @@ +/* + * Governance Policy Management API + * + * Read and manage OPA Governance policies, policy sets and evaluations + * + * API version: 1.2.0 + * Generated by: Swagger Codegen (https://github.com/swagger-api/swagger-codegen.git) + */ +package policymgmt + +type AnalyzeResponse struct { + // Build identifier + Desc string `json:"desc"` + // status + Status string `json:"status"` +} diff --git a/harness/policymgmt/model_evaluate_by_type_check_response_body.go b/harness/policymgmt/model_evaluate_by_type_check_response_body.go new file mode 100644 index 00000000..648a9ea7 --- /dev/null +++ b/harness/policymgmt/model_evaluate_by_type_check_response_body.go @@ -0,0 +1,14 @@ +/* + * Governance Policy Management API + * + * Read and manage OPA Governance policies, policy sets and evaluations + * + * API version: 1.2.0 + * Generated by: Swagger Codegen (https://github.com/swagger-api/swagger-codegen.git) + */ +package policymgmt + +type EvaluateByTypeCheckResponseBody struct { + // Boolean value that indicates if there are policies to evaluate for the given type, action and acc/org/proj scope. + ShouldEvaluate bool `json:"should_evaluate"` +} diff --git a/harness/policymgmt/model_evaluation.go b/harness/policymgmt/model_evaluation.go index 38c52989..f955fcd7 100644 --- a/harness/policymgmt/model_evaluation.go +++ b/harness/policymgmt/model_evaluation.go @@ -34,6 +34,6 @@ type Evaluation struct { ProjectId string `json:"project_id"` // The overall status of the evaluation indicating whether it passed Status string `json:"status"` - // The type of the entity under evaluation + // The types of the entity under evaluation Type_ string `json:"type"` } diff --git a/harness/policymgmt/model_generate_request_body.go b/harness/policymgmt/model_generate_request_body.go new file mode 100644 index 00000000..066f52f9 --- /dev/null +++ b/harness/policymgmt/model_generate_request_body.go @@ -0,0 +1,16 @@ +/* + * Governance Policy Management API + * + * Read and manage OPA Governance policies, policy sets and evaluations + * + * API version: 1.2.0 + * Generated by: Swagger Codegen (https://github.com/swagger-api/swagger-codegen.git) + */ +package policymgmt + +type GenerateRequestBody struct { + // policySample Data + PolicyData string `json:"policyData,omitempty"` + // Text query + Query string `json:"query,omitempty"` +} diff --git a/harness/policymgmt/model_linked_policy.go b/harness/policymgmt/model_linked_policy.go index 311f536a..226c57c5 100644 --- a/harness/policymgmt/model_linked_policy.go +++ b/harness/policymgmt/model_linked_policy.go @@ -12,7 +12,7 @@ type LinkedPolicy struct { // Harness account ID associated with this policy AccountId string `json:"account_id"` // Time the policy was created - Created int64 `json:"created,omitempty"` + Created int64 `json:"created"` // identifier of the policy Identifier string `json:"identifier"` // Name of the policy @@ -22,9 +22,9 @@ type LinkedPolicy struct { // Harness project ID associated with this policy ProjectId string `json:"project_id"` // Rego that defines the policy - Rego string `json:"rego,omitempty"` + Rego string `json:"rego"` // The severity of this policy in this context Severity string `json:"severity"` // Time the policy was last updated - Updated int64 `json:"updated,omitempty"` + Updated int64 `json:"updated"` } diff --git a/harness/policymgmt/model_policy.go b/harness/policymgmt/model_policy.go index b2780bb2..9e93d0f9 100644 --- a/harness/policymgmt/model_policy.go +++ b/harness/policymgmt/model_policy.go @@ -19,10 +19,16 @@ type Policy struct { GitConnectorRef string `json:"git_connector_ref,omitempty"` // The default branch, the service pulls in changes from from this branch for policy evaluation GitDefaultBranch string `json:"git_default_branch,omitempty"` + // The commit sha of the commit that last effected the file in the default branch + GitDefaultBranchCommitSha string `json:"git_default_branch_commit_sha,omitempty"` + // The file id of the file in the default branch, may be empty for bitbucket files + GitDefaultBranchFileId string `json:"git_default_branch_file_id,omitempty"` + // The url of the file in the default branch + GitDefaultBranchFileUrl string `json:"git_default_branch_file_url,omitempty"` GitDefaultBranchUpdateError *GitErrorResult `json:"git_default_branch_update_error,omitempty"` // The last time the service successfully pulled in changes from the default branch GitDefaultBranchUpdated int64 `json:"git_default_branch_updated,omitempty"` - // The file if od the bile being updated + // The file id of the file, may be empty for bitbucket files GitFileId string `json:"git_file_id,omitempty"` // The url of the file on the fit provider GitFileUrl string `json:"git_file_url,omitempty"` diff --git a/harness/policymgmt/model_policy_example.go b/harness/policymgmt/model_policy_example.go index 1270c319..8c77fc06 100644 --- a/harness/policymgmt/model_policy_example.go +++ b/harness/policymgmt/model_policy_example.go @@ -20,4 +20,6 @@ type PolicyExample struct { Rego string `json:"rego"` // The type of entity illustrated in this example Type_ string `json:"type"` + // The list of substitutable variables in the policy example + Variables []Variable `json:"variables,omitempty"` } diff --git a/harness/policymgmt/model_policy_sample.go b/harness/policymgmt/model_policy_sample.go new file mode 100644 index 00000000..9d809416 --- /dev/null +++ b/harness/policymgmt/model_policy_sample.go @@ -0,0 +1,16 @@ +/* + * Governance Policy Management API + * + * Read and manage OPA Governance policies, policy sets and evaluations + * + * API version: 1.2.0 + * Generated by: Swagger Codegen (https://github.com/swagger-api/swagger-codegen.git) + */ +package policymgmt + +type PolicySample struct { + // Build identifier + Policy string `json:"policy"` + // status + Status string `json:"status"` +} diff --git a/harness/policymgmt/model_policy_set.go b/harness/policymgmt/model_policy_set.go index 29a8eee9..d7fe9cc7 100644 --- a/harness/policymgmt/model_policy_set.go +++ b/harness/policymgmt/model_policy_set.go @@ -19,6 +19,8 @@ type PolicySet struct { Description string `json:"description,omitempty"` // Only enabled policy sets are evaluated when evaluating by type/action Enabled bool `json:"enabled"` + // A string enum value which determines which entities the policy set applies to during evaluation + EntitySelector string `json:"entity_selector"` // Identifier of the policy set Identifier string `json:"identifier"` // Name of the policy set @@ -29,6 +31,8 @@ type PolicySet struct { Policies []LinkedPolicy `json:"policies,omitempty"` // Harness project ID associated with this policy set ProjectId string `json:"project_id"` + // The groups of resources that this policy set should be applied to + ResourceGroups []ResourceGroup `json:"resource_groups,omitempty"` // Type of input suitable for the policy set Type_ string `json:"type"` // Time the policy set was last updated diff --git a/harness/policymgmt/model_resource_group.go b/harness/policymgmt/model_resource_group.go new file mode 100644 index 00000000..c3b0f134 --- /dev/null +++ b/harness/policymgmt/model_resource_group.go @@ -0,0 +1,24 @@ +/* + * Governance Policy Management API + * + * Read and manage OPA Governance policies, policy sets and evaluations + * + * API version: 1.2.0 + * Generated by: Swagger Codegen (https://github.com/swagger-api/swagger-codegen.git) + */ +package policymgmt + +type ResourceGroup struct { + // resource group account id + AccountId string `json:"account_id"` + // resource group timestamp + Created int64 `json:"created"` + // resource group identifier + Identifier string `json:"identifier"` + // resource group name + Name string `json:"name"` + // resource group org id + OrgId string `json:"org_id"` + // resource group project identifier + ProjectId string `json:"project_id"` +} diff --git a/harness/policymgmt/model_resource_group_identifier.go b/harness/policymgmt/model_resource_group_identifier.go new file mode 100644 index 00000000..8c797bb0 --- /dev/null +++ b/harness/policymgmt/model_resource_group_identifier.go @@ -0,0 +1,20 @@ +/* + * Governance Policy Management API + * + * Read and manage OPA Governance policies, policy sets and evaluations + * + * API version: 1.2.0 + * Generated by: Swagger Codegen (https://github.com/swagger-api/swagger-codegen.git) + */ +package policymgmt + +type ResourceGroupIdentifier struct { + // resource group account id + AccountId string `json:"account_id"` + // resource group identifier + Identifier string `json:"identifier"` + // resource group org id + OrgId string `json:"org_id"` + // resource group project identifier + ProjectId string `json:"project_id"` +} diff --git a/harness/policymgmt/model_update_request_body2.go b/harness/policymgmt/model_update_request_body2.go index 9715efbf..c1c6808f 100644 --- a/harness/policymgmt/model_update_request_body2.go +++ b/harness/policymgmt/model_update_request_body2.go @@ -14,11 +14,15 @@ type UpdateRequestBody2 struct { // Description of the policy set Description string `json:"description,omitempty"` // Only enabled policy sets are evaluated when evaluating by type/action - Enabled bool `json:"enabled"` + Enabled bool `json:"enabled,omitempty"` + // A string enum value which determines which entities the policy set applies to during evaluation. This feature is not available for all accounts, Contact support if you wish to have it enabled. + EntitySelector string `json:"entity_selector,omitempty"` // Name of the policy set Name string `json:"name,omitempty"` // Policies linked to this policy set Policies []Linkedpolicyidentifier `json:"policies,omitempty"` + // Resource groups that contain the resources that this policy set should be evaluated for. Resource groups are not supported for flag or custom policy sets. This feature is not available for all accounts, Contact support if you wish to have it enabled. + ResourceGroups []ResourceGroupIdentifier `json:"resource_groups,omitempty"` // Type of input suitable for the policy set Type_ string `json:"type,omitempty"` } diff --git a/harness/policymgmt/model_variable.go b/harness/policymgmt/model_variable.go new file mode 100644 index 00000000..07d2edc2 --- /dev/null +++ b/harness/policymgmt/model_variable.go @@ -0,0 +1,24 @@ +/* + * Governance Policy Management API + * + * Read and manage OPA Governance policies, policy sets and evaluations + * + * API version: 1.2.0 + * Generated by: Swagger Codegen (https://github.com/swagger-api/swagger-codegen.git) + */ +package policymgmt + +type Variable struct { + // The values that are selected by default + Default_ []string `json:"default,omitempty"` + // Longer description of the variable to substitute + Desc string `json:"desc,omitempty"` + // The id of the variable to substitute in the rego + Id string `json:"id,omitempty"` + // The human readable name of the variable to substitute in the rego + Name string `json:"name,omitempty"` + // The variable type + Type_ string `json:"type,omitempty"` + // Pre populated sample values to substitute the variable with + Values []string `json:"values,omitempty"` +} diff --git a/harness/policymgmt/swagger/openapi3.json b/harness/policymgmt/swagger/openapi3.json index de1a5013..4255aa96 100644 --- a/harness/policymgmt/swagger/openapi3.json +++ b/harness/policymgmt/swagger/openapi3.json @@ -1 +1 @@ -{"openapi":"3.0.3","info":{"title":"Governance Policy Management API","description":"Read and manage OPA Governance policies, policy sets and evaluations","version":"1.2.0"},"servers":[{"url":"https://app.harness.io/gateway/pm/"}],"paths":{"/api/v1/dashboard":{"get":{"tags":["dashboard"],"description":"Get metrics about policies, policy sets and evaluations","operationId":"dashboard#metrics","parameters":[{"name":"range","in":"query","description":"The time period over which to aggregate dashboard data. Can be: 24 hours, 7 days or 30 days","allowEmptyValue":true,"schema":{"type":"string","description":"The time period over which to aggregate dashboard data. Can be: 24 hours, 7 days or 30 days","default":"30d","example":"30d","enum":["24h","7d","30d"]},"example":"30d"},{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/DashboardMetrics"},"example":{"aggregates":[{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866},{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866},{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866}],"policy_health":{"total_evaluation_count":7467880620589340301,"total_evaluation_entity_count":{"error":4962770580155356801,"pass":1838564234748219477,"warning":6712404284550845579},"total_policy_count":1018281497905076142,"total_policy_set_count":4767159674574934953,"total_policy_set_entity_count":{"A ut.":8823333786778254735}}}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]}]}},"/api/v1/evaluate":{"post":{"tags":["evaluate"],"description":"Evaluate arbitrary rego","operationId":"evaluate#evaluate","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/EvaluateRequestBody"},"example":{"input":"{\"message\": \"everyone\"}","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}}}},"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/EvaluatedPolicy"},"example":{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}}}},"400":{"description":"PolicySetNotFound: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]}]}},"/api/v1/evaluate-by-ids":{"post":{"tags":["evaluate"],"description":"Evaluate policy sets by ID","operationId":"evaluate#evaluate-by-ids","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"entity","in":"query","description":"User-supplied global identifier of the entity under evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"User-supplied global identifier of the entity under evaluation","default":"","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},{"name":"entityMetadata","in":"query","description":"User-supplied additional metadata for the entity under evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"User-supplied additional metadata for the entity under evaluation","default":"","example":"{\"name\":\"test-entity\"}"},"example":"{\"name\":\"test-entity\"}"},{"name":"principalIdentifier","in":"query","description":"Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType'","allowEmptyValue":true,"schema":{"type":"string","description":"Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType'","default":"","example":"aaabbbcccddd"},"example":"aaabbbcccddd"},{"name":"principalType","in":"query","description":"Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier'","allowEmptyValue":true,"schema":{"type":"string","description":"Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier'","default":"","example":"USER"},"example":"USER"},{"name":"userIdentifier","in":"query","description":"Deprecated: Please use 'principalIdentifier' and 'principalType' instead","allowEmptyValue":true,"schema":{"type":"string","description":"Deprecated: Please use 'principalIdentifier' and 'principalType' instead","default":"","example":"Voluptas qui veniam."},"example":"Nisi facere eaque."},{"name":"ids","in":"query","description":"Comma-separated list of identifiers for the policy sets that should be evaluated, with account. or org. prefixes if needed","allowEmptyValue":true,"required":true,"schema":{"type":"string","description":"Comma-separated list of identifiers for the policy sets that should be evaluated, with account. or org. prefixes if needed","example":"policyset-1,policyset-2,policyset-3","minLength":1},"example":"policyset-1,policyset-2,policyset-3"}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Evaluation"},"example":{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"}}}},"400":{"description":"PolicySetNotFound: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]}]}},"/api/v1/evaluate-by-type":{"post":{"tags":["evaluate"],"description":"Evaluate all policy sets of a specified type","operationId":"evaluate#evaluate-by-type","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"entity","in":"query","description":"User-supplied global identifier of the entity under evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"User-supplied global identifier of the entity under evaluation","default":"","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},{"name":"entityMetadata","in":"query","description":"User-supplied additional metadata for the entity under evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"User-supplied additional metadata for the entity under evaluation","default":"","example":"{\"name\":\"test-entity\"}"},"example":"{\"name\":\"test-entity\"}"},{"name":"type","in":"query","description":"Type of entity under evaluation","allowEmptyValue":true,"required":true,"schema":{"type":"string","description":"Type of entity under evaluation","example":"pipeline","minLength":1},"example":"pipeline"},{"name":"action","in":"query","description":"Action that triggered the evaluation","allowEmptyValue":true,"required":true,"schema":{"type":"string","description":"Action that triggered the evaluation","example":"onrun","minLength":1},"example":"onrun"},{"name":"principalIdentifier","in":"query","description":"Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType'","allowEmptyValue":true,"schema":{"type":"string","description":"Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType'","default":"","example":"aaabbbcccddd"},"example":"aaabbbcccddd"},{"name":"principalType","in":"query","description":"Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier'","allowEmptyValue":true,"schema":{"type":"string","description":"Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier'","default":"","example":"USER"},"example":"USER"},{"name":"userIdentifier","in":"query","description":"Deprecated: Please use 'principalIdentifier' and 'principalType' instead","allowEmptyValue":true,"schema":{"type":"string","description":"Deprecated: Please use 'principalIdentifier' and 'principalType' instead","default":"","example":"Molestias nostrum dolor."},"example":"Explicabo ea excepturi natus unde dolores."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Evaluation"},"example":{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"}}}},"400":{"description":"PolicySetNotFound: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]}]}},"/api/v1/evaluations":{"get":{"tags":["evaluations"],"description":"List evaluations","operationId":"evaluations#list","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"per_page","in":"query","description":"Number of results per page","allowEmptyValue":true,"schema":{"type":"integer","description":"Number of results per page","default":50,"example":20,"minimum":1,"maximum":100},"example":20},{"name":"page","in":"query","description":"Page number (starting from 0)","allowEmptyValue":true,"schema":{"type":"integer","description":"Page number (starting from 0)","default":0,"example":4,"minimum":0},"example":4},{"name":"entity","in":"query","description":"Filter by the entity associated with the evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"Filter by the entity associated with the evaluation","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},{"name":"type","in":"query","description":"Filter by the type associated with the evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"Filter by the type associated with the evaluation","example":"pipeline"},"example":"pipeline"},{"name":"action","in":"query","description":"Filter by the action associated with the evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"Filter by the action associated with the evaluation","example":"onrun"},"example":"onrun"},{"name":"last_seen","in":"query","description":"Retrieve results starting after this last-seen result","allowEmptyValue":true,"schema":{"type":"integer","description":"Retrieve results starting after this last-seen result","example":123,"format":"int64"},"example":123},{"name":"includeChildScopes","in":"query","description":"When true, evaluations from child scopes will be inculded in the results","allowEmptyValue":true,"schema":{"type":"boolean","description":"When true, evaluations from child scopes will be inculded in the results","default":false,"example":false},"example":false}],"responses":{"200":{"description":"OK response.","headers":{"Link":{"description":"Link-based paging","required":true,"schema":{"type":"string","description":"Link-based paging","example":""},"example":""},"X-Page-Index":{"description":"Page number","required":true,"schema":{"type":"integer","description":"Page number","example":4,"format":"int64"},"example":4},"X-Page-Item-Count":{"description":"Number of results in this page","required":true,"schema":{"type":"integer","description":"Number of results in this page","example":20,"format":"int64"},"example":20},"X-Page-Size":{"description":"Requested page size","required":true,"schema":{"type":"integer","description":"Requested page size","example":20,"format":"int64"},"example":20},"X-Total-Items":{"description":"Total results available","required":true,"schema":{"type":"integer","description":"Total results available","example":230,"format":"int64"},"example":230},"X-Total-Pages":{"description":"Total pages available","required":true,"schema":{"type":"integer","description":"Total pages available","example":12,"format":"int64"},"example":12}},"content":{"application/json":{"schema":{"type":"array","items":{"$ref":"#/components/schemas/Evaluation2"},"example":[{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"},{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"}]},"example":[{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"},{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"},{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"},{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"}]}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]}]}},"/api/v1/evaluations/{id}":{"get":{"tags":["evaluations"],"description":"Find an evaluation by ID","operationId":"evaluations#find","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"id","in":"path","description":"The ID of the evaluation to retrieve","required":true,"schema":{"type":"integer","description":"The ID of the evaluation to retrieve","example":123,"format":"int64"},"example":123}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Evaluation"},"example":{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]}]}},"/api/v1/examples":{"get":{"tags":["examples"],"description":"list examples","operationId":"examples#list","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Consequatur ea."},"example":"Molestias qui cupiditate sint."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"type":"array","items":{"$ref":"#/components/schemas/PolicyExample"},"example":[{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline"},{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline"},{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline"}]},"example":[{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline"},{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline"}]}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/policies":{"get":{"tags":["policies"],"description":"List all policies","operationId":"policies#list","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"per_page","in":"query","description":"Number of results per page","allowEmptyValue":true,"schema":{"type":"integer","description":"Number of results per page","default":50,"example":20,"minimum":1,"maximum":100},"example":20},{"name":"page","in":"query","description":"Page number (starting from 0)","allowEmptyValue":true,"schema":{"type":"integer","description":"Page number (starting from 0)","default":0,"example":4,"minimum":0},"example":4},{"name":"searchTerm","in":"query","description":"Filter results by partial name match","allowEmptyValue":true,"schema":{"type":"string","description":"Filter results by partial name match","default":"","example":"poli"},"example":"poli"},{"name":"sort","in":"query","description":"Sort order for results","allowEmptyValue":true,"schema":{"type":"string","description":"Sort order for results","default":"name,ASC","example":"name,ASC","enum":["name,ASC","name,DESC","updated,ASC","updated,DESC"]},"example":"name,DESC"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Harum aliquam facere."},"example":"Adipisci et nesciunt libero."}],"responses":{"200":{"description":"OK response.","headers":{"Link":{"description":"Link-based paging","required":true,"schema":{"type":"string","description":"Link-based paging","example":""},"example":""},"X-Page-Index":{"description":"Page number","required":true,"schema":{"type":"integer","description":"Page number","example":4,"format":"int64"},"example":4},"X-Page-Item-Count":{"description":"Number of results in this page","required":true,"schema":{"type":"integer","description":"Number of results in this page","example":20,"format":"int64"},"example":20},"X-Page-Size":{"description":"Requested page size","required":true,"schema":{"type":"integer","description":"Requested page size","example":20,"format":"int64"},"example":20},"X-Total-Items":{"description":"Total results available","required":true,"schema":{"type":"integer","description":"Total results available","example":230,"format":"int64"},"example":230},"X-Total-Pages":{"description":"Total pages available","required":true,"schema":{"type":"integer","description":"Total pages available","example":12,"format":"int64"},"example":12}},"content":{"application/json":{"schema":{"type":"array","items":{"$ref":"#/components/schemas/Policy"},"example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674}]},"example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674}]}}},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"post":{"tags":["policies"],"description":"Create a policy","operationId":"policies#create","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"module","in":"query","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","allowEmptyValue":true,"schema":{"type":"string","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","example":"sto","enum":["cd","cf","ci","sto","cv"]},"example":"cv"},{"name":"git_commit_msg","in":"query","description":"The commit message used in git when creating the policy","allowEmptyValue":true,"schema":{"type":"string","description":"The commit message used in git when creating the policy","example":"harness policy commit msg"},"example":"harness policy commit msg"},{"name":"git_import","in":"query","description":"A flag to determine if the api should try and import and existing policy from git","allowEmptyValue":true,"schema":{"type":"boolean","description":"A flag to determine if the api should try and import and existing policy from git","example":true},"example":true},{"name":"git_branch","in":"query","description":"The git branch the policy will be created in","allowEmptyValue":true,"schema":{"type":"string","description":"The git branch the policy will be created in","example":"main"},"example":"main"},{"name":"git_is_new_branch","in":"query","description":"A flag to determine if the api should try and commit to a new branch","allowEmptyValue":true,"schema":{"type":"boolean","description":"A flag to determine if the api should try and commit to a new branch","example":true},"example":true},{"name":"git_base_branch","in":"query","description":"If committing to a new branch, git_base_branch tells the api which branch to base the new branch from","allowEmptyValue":true,"schema":{"type":"string","description":"If committing to a new branch, git_base_branch tells the api which branch to base the new branch from","example":"main"},"example":"main"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Quis enim alias deserunt repudiandae quidem est."},"example":"Laudantium ea unde consequuntur."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/CreateRequestBody"},"example":{"git_connector_ref":".","git_path":".harness/policy.rego","git_repo":"github.com/org/repo","identifier":"policy-1","name":"Check that an approval step is present","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}}}},"responses":{"201":{"description":"Created response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Policy"},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674}}}},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/policies/{identifier}":{"delete":{"tags":["policies"],"description":"Delete a policy by identifier","operationId":"policies#delete","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"module","in":"query","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","allowEmptyValue":true,"schema":{"type":"string","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","example":"ci","enum":["cd","cf","ci","sto","cv"]},"example":"sto"},{"name":"identifier","in":"path","description":"Identifier of the policy","required":true,"schema":{"type":"string","description":"Identifier of the policy","example":"policy-1","minLength":1},"example":"policy-1"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Est quidem explicabo pariatur qui."},"example":"Molestiae non eaque et sunt."}],"responses":{"204":{"description":"No Content response."},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"get":{"tags":["policies"],"description":"Find a policy by identifier","operationId":"policies#find","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"git_branch","in":"query","description":"The git branch the policy resides in","allowEmptyValue":true,"schema":{"type":"string","description":"The git branch the policy resides in","example":"main"},"example":"main"},{"name":"identifier","in":"path","description":"Identifier of the policy to retrieve","required":true,"schema":{"type":"string","description":"Identifier of the policy to retrieve","example":"policy-1","minLength":1},"example":"policy-1"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Nihil molestias iure iste aliquam excepturi hic."},"example":"Et voluptate nobis ex quis distinctio quis."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Policy"},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674}}}},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"patch":{"tags":["policies"],"description":"Update a policy by identifier","operationId":"policies#update","parameters":[{"name":"git_commit_msg","in":"query","description":"The commit message used in git when creating the policy","allowEmptyValue":true,"schema":{"type":"string","description":"The commit message used in git when creating the policy","example":"harness policy commit msg"},"example":"harness policy commit msg"},{"name":"git_is_new_branch","in":"query","description":"A flag to determine if the api should try and commit to a new branch","allowEmptyValue":true,"schema":{"type":"boolean","description":"A flag to determine if the api should try and commit to a new branch","example":true},"example":true},{"name":"git_base_branch","in":"query","description":"If committing to a new branch, git_base_branch tells the api which branch to base the new branch from","allowEmptyValue":true,"schema":{"type":"string","description":"If committing to a new branch, git_base_branch tells the api which branch to base the new branch from","example":"main"},"example":"main"},{"name":"git_branch","in":"query","description":"The git branch the policy resides in","allowEmptyValue":true,"schema":{"type":"string","description":"The git branch the policy resides in","example":"main"},"example":"main"},{"name":"git_commit_sha","in":"query","description":"The existing commit sha of the file being updated","allowEmptyValue":true,"schema":{"type":"string","description":"The existing commit sha of the file being updated","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},{"name":"git_file_id","in":"query","description":"The existing file if od the bile being updated","allowEmptyValue":true,"schema":{"type":"string","description":"The existing file if od the bile being updated","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"module","in":"query","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","allowEmptyValue":true,"schema":{"type":"string","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","example":"cd","enum":["cd","cf","ci","sto","cv"]},"example":"cf"},{"name":"identifier","in":"path","description":"Identifier of the policy","required":true,"schema":{"type":"string","description":"Identifier of the policy","example":"policy-1"},"example":"policy-1"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Accusantium quidem unde harum harum."},"example":"Ut dolores quae."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/UpdateRequestBody"},"example":{"name":"Check that an approval step is present","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}}}},"responses":{"204":{"description":"No Content response."},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/policysets":{"get":{"tags":["policysets"],"description":"List all policy sets","operationId":"policysets#list","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"per_page","in":"query","description":"Number of results per page","allowEmptyValue":true,"schema":{"type":"integer","description":"Number of results per page","default":50,"example":20,"minimum":1,"maximum":100},"example":20},{"name":"page","in":"query","description":"Page number (starting from 0)","allowEmptyValue":true,"schema":{"type":"integer","description":"Page number (starting from 0)","default":0,"example":4,"minimum":0},"example":4},{"name":"searchTerm","in":"query","description":"Filter results by partial name match","allowEmptyValue":true,"schema":{"type":"string","description":"Filter results by partial name match","default":"","example":"poli"},"example":"poli"},{"name":"sort","in":"query","description":"Sort order for results","allowEmptyValue":true,"schema":{"type":"string","description":"Sort order for results","default":"name,ASC","example":"updated,ASC","enum":["name,ASC","name,DESC","updated,ASC","updated,DESC"]},"example":"updated,ASC"},{"name":"type","in":"query","description":"Filter results by type","allowEmptyValue":true,"schema":{"type":"string","description":"Filter results by type","example":"pipeline","minLength":1},"example":"pipeline"},{"name":"action","in":"query","description":"Filter results by action","allowEmptyValue":true,"schema":{"type":"string","description":"Filter results by action","example":"onrun","minLength":1},"example":"onrun"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Aliquid soluta repellendus numquam."},"example":"Eos inventore temporibus."}],"responses":{"200":{"description":"OK response.","headers":{"Link":{"description":"Link-based paging","required":true,"schema":{"type":"string","description":"Link-based paging","example":""},"example":""},"X-Page-Index":{"description":"Page number","required":true,"schema":{"type":"integer","description":"Page number","example":4,"format":"int64"},"example":4},"X-Page-Item-Count":{"description":"Number of results in this page","required":true,"schema":{"type":"integer","description":"Number of results in this page","example":20,"format":"int64"},"example":20},"X-Page-Size":{"description":"Requested page size","required":true,"schema":{"type":"integer","description":"Requested page size","example":20,"format":"int64"},"example":20},"X-Total-Items":{"description":"Total results available","required":true,"schema":{"type":"integer","description":"Total results available","example":230,"format":"int64"},"example":230},"X-Total-Pages":{"description":"Total pages available","required":true,"schema":{"type":"integer","description":"Total pages available","example":12,"format":"int64"},"example":12}},"content":{"application/json":{"schema":{"type":"array","items":{"$ref":"#/components/schemas/PolicySet"},"example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","type":"pipeline","updated":1636669297674}]},"example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","type":"pipeline","updated":1636669297674}]}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"post":{"tags":["policysets"],"description":"Create a policy set","operationId":"policysets#create","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"module","in":"query","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","allowEmptyValue":true,"schema":{"type":"string","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","example":"cd","enum":["cd","cf","ci","sto","cv"]},"example":"cv"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Et dolores cum."},"example":"Sed perspiciatis debitis."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/CreateRequestBody2"},"example":{"action":"onrun","description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","type":"pipeline"}}}},"responses":{"201":{"description":"Created response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/PolicySet2"},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","type":"pipeline","updated":1636669297674}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/policysets/{identifier}":{"delete":{"tags":["policysets"],"description":"Delete a policy set by identifier","operationId":"policysets#delete","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"module","in":"query","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","allowEmptyValue":true,"schema":{"type":"string","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","example":"cd","enum":["cd","cf","ci","sto","cv"]},"example":"cd"},{"name":"identifier","in":"path","description":"Identifier of the policy set","required":true,"schema":{"type":"string","description":"Identifier of the policy set","example":"policyset-1","minLength":1},"example":"policyset-1"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Veniam cum praesentium et corrupti harum."},"example":"Enim velit exercitationem natus voluptatem placeat occaecati."}],"responses":{"204":{"description":"No Content response."},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"get":{"tags":["policysets"],"description":"Find a policy set by identifier","operationId":"policysets#find","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"identifier","in":"path","description":"Identifier of the policy set to retrieve","required":true,"schema":{"type":"string","description":"Identifier of the policy set to retrieve","example":"policyset-1","minLength":1},"example":"policyset-1"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Ad quo sequi animi perspiciatis."},"example":"Maiores quia et fugiat cum architecto."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/PolicySet2"},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","type":"pipeline","updated":1636669297674}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"patch":{"tags":["policysets"],"description":"Update a policy set by identifier","operationId":"policysets#update","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"module","in":"query","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","allowEmptyValue":true,"schema":{"type":"string","description":"The module in which the resource was created, updated or deleted. Only relevant in the context of a project","example":"cf","enum":["cd","cf","ci","sto","cv"]},"example":"cf"},{"name":"identifier","in":"path","description":"Identifier of the policy set","required":true,"schema":{"type":"string","description":"Identifier of the policy set","example":"policyset-1"},"example":"policyset-1"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Quo voluptatum minima nulla facere."},"example":"Unde quidem et sint."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/UpdateRequestBody2"},"example":{"action":"onrun","description":"Captures critical production policies","enabled":true,"name":"Production Policies","policies":[{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"}],"type":"pipeline"}}}},"responses":{"204":{"description":"No Content response."},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/system/health":{"get":{"tags":["system"],"description":"Check service health","operationId":"system#health","responses":{"204":{"description":"No Content response."},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}}}},"/api/v1/system/version":{"get":{"tags":["system"],"description":"Check service version","operationId":"system#version","responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/ServiceVersion"},"example":{"commit":"96381692bf3a2bd7904769c6886e832435768b57","version":"v0.123.0"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}}}}},"components":{"schemas":{"AggregateStatus":{"type":"object","properties":{"error":{"type":"integer","description":"Count of evaluations that have a status of 'error'","example":6131954873636422800,"format":"int64"},"pass":{"type":"integer","description":"Count of evaluations that have a status of 'pass'","example":6122119631547907047,"format":"int64"},"time":{"type":"integer","description":"The Unix time of this particular aggregation","example":4891691738930437908,"format":"int64"},"warning":{"type":"integer","description":"Count of evaluations that have a status of 'warning'","example":4996866704380369589,"format":"int64"}},"description":"Aggregate metrics for evaluations on a single day","example":{"error":2174285678586957279,"pass":6713433384340029592,"time":1299583733304690280,"warning":2581612184076268921},"required":["time","error","warning","pass"]},"CreateRequestBody":{"type":"object","properties":{"git_connector_ref":{"type":"string","description":"The harness connector used for authenticating on the git provider","example":"."},"git_path":{"type":"string","description":"The path to the file in the git repo","example":".harness/policy.rego"},"git_repo":{"type":"string","description":"The git repo the policy resides in","example":"github.com/org/repo"},"identifier":{"type":"string","description":"Identifier for the policy","example":"policy-1","minLength":1},"name":{"type":"string","description":"Name of the policy","example":"Check that an approval step is present","minLength":1},"rego":{"type":"string","description":"Rego that defines the policy policy","example":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","minLength":1}},"example":{"git_connector_ref":".","git_path":".harness/policy.rego","git_repo":"github.com/org/repo","identifier":"policy-1","name":"Check that an approval step is present","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"},"required":["name","rego","identifier","created","updated","account_id","org_id","project_id"]},"CreateRequestBody2":{"type":"object","properties":{"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"identifier":{"type":"string","description":"Identifier for the policy set","example":"policyset-1","minLength":1},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies","minLength":1},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline","minLength":1}},"example":{"action":"onrun","description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","type":"pipeline"},"required":["identifier","name","enabled","type","action","created","updated","account_id","org_id","project_id"]},"DashboardMetrics":{"type":"object","properties":{"aggregates":{"type":"array","items":{"$ref":"#/components/schemas/AggregateStatus"},"description":"Aggregate evaluation counts by day","example":[{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866},{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866},{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866}]},"policy_health":{"$ref":"#/components/schemas/PolicyHealth"}},"example":{"aggregates":[{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866},{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866},{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866},{"error":1201513832267580740,"pass":2920020791307846359,"time":461119712411546138,"warning":6971582622373151866}],"policy_health":{"total_evaluation_count":7467880620589340301,"total_evaluation_entity_count":{"error":4962770580155356801,"pass":1838564234748219477,"warning":6712404284550845579},"total_policy_count":1018281497905076142,"total_policy_set_count":4767159674574934953,"total_policy_set_entity_count":{"A ut.":8823333786778254735}}},"required":["policy_health","aggregates"]},"Error":{"type":"object","properties":{"fault":{"type":"boolean","description":"Is the error a server-side fault?","example":true},"id":{"type":"string","description":"ID is a unique identifier for this particular occurrence of the problem.","example":"123abc"},"message":{"type":"string","description":"Message is a human-readable explanation specific to this occurrence of the problem.","example":"parameter 'p' must be an integer"},"name":{"type":"string","description":"Name is the name of this class of errors.","example":"bad_request"},"temporary":{"type":"boolean","description":"Is the error temporary?","example":true},"timeout":{"type":"boolean","description":"Is the error a timeout?","example":false}},"example":{"id":"3F1FKVRR","message":"Value of ID must be an integer","name":"bad_request"},"required":["name","id","message","temporary","timeout","fault"]},"ErrorResultWithIdentifier":{"type":"object","properties":{"fault":{"type":"boolean","description":"Is the error a server-side fault?","example":false},"id":{"type":"string","description":"ID is a unique identifier for this particular occurrence of the problem.","example":"123abc"},"identifier":{"type":"string","description":"the identifier associated with the error","example":"policy-1"},"message":{"type":"string","description":"Message is a human-readable explanation specific to this occurrence of the problem.","example":"parameter 'p' must be an integer"},"name":{"type":"string","description":"Name is the name of this class of errors.","example":"bad_request"},"temporary":{"type":"boolean","description":"Is the error temporary?","example":true},"timeout":{"type":"boolean","description":"Is the error a timeout?","example":true}},"example":{"fault":false,"id":"123abc","identifier":"policy-1","message":"parameter 'p' must be an integer","name":"bad_request","temporary":true,"timeout":false},"required":["name","id","message","temporary","timeout","fault"]},"EvaluateRequestBody":{"type":"object","properties":{"input":{"type":"string","description":"Input to evaluate","example":"{\"message\": \"everyone\"}","format":"binary"},"rego":{"type":"string","description":"Arbitrary rego to be evaluated","example":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","minLength":1}},"example":{"input":"{\"message\": \"everyone\"}","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"},"required":["rego","input"]},"EvaluatedPolicy":{"type":"object","properties":{"deny_messages":{"type":"array","items":{"type":"string","example":"Quia animi et harum velit officia."},"description":"The values of any `deny` rego rules as returned by the rego engine","example":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"]},"error":{"type":"string","description":"Any errors returned by the rego engine when this policy was evaluated","example":"policy.rego:25: rego_parse_error: non-terminated string m == \"test"},"output":{"type":"string","description":"The output returned by the rego engine when this policy was evaluated","example":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","format":"binary"},"policy":{"$ref":"#/components/schemas/Policy"},"status":{"type":"string","description":"The overall status for this individual policy indicating whether it passed","example":"error","enum":["error","warning","pass"]}},"example":{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},"required":["status","policy","output","deny_messages","error"]},"Evaluation":{"type":"object","properties":{"account_id":{"type":"string","description":"The Harness account in which the evaluation was performed","example":"XRQAjvT37acOiXx9PRaQMF"},"action":{"type":"string","description":"The action that triggered evaluation","example":"onrun"},"created":{"type":"integer","description":"The time at which the evaluation was performed in Unix time millseconds","example":1636370209475,"format":"int64"},"details":{"type":"array","items":{"$ref":"#/components/schemas/EvaluationDetail"},"description":"The detailed results of te evaluation","example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}]},"entity":{"type":"string","description":"An arbtrary user-supplied string that globally identifies the entity under evaluation","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"entity_metadata":{"type":"string","description":"Additional arbtrary user-supplied metadta about the entity under evaluation","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"id":{"type":"integer","description":"The ID of this evaluation","example":123,"format":"int64"},"input":{"type":"string","description":"The input provided at evaluation time","example":"","format":"binary"},"org_id":{"type":"string","description":"The Harness organisation in which the evaluation was performed","example":"test-org"},"project_id":{"type":"string","description":"The Harness project in which the evaluation was performed","example":"test-project"},"status":{"type":"string","description":"The overall status of the evaluation indicating whether it passed","example":"error","enum":["error","warning","pass"]},"type":{"type":"string","description":"The type of the entity under evaluation","example":"pipeline"}},"example":{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"},"required":["id","status","entity","entity_metadata","type","action","account_id","org_id","project_id","created","input","details"]},"Evaluation2":{"type":"object","properties":{"account_id":{"type":"string","description":"The Harness account in which the evaluation was performed","example":"XRQAjvT37acOiXx9PRaQMF"},"action":{"type":"string","description":"The action that triggered evaluation","example":"onrun"},"created":{"type":"integer","description":"The time at which the evaluation was performed in Unix time millseconds","example":1636370209475,"format":"int64"},"details":{"type":"array","items":{"$ref":"#/components/schemas/EvaluationDetail2"},"description":"The detailed results of te evaluation","example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}]},"entity":{"type":"string","description":"An arbtrary user-supplied string that globally identifies the entity under evaluation","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"entity_metadata":{"type":"string","description":"Additional arbtrary user-supplied metadta about the entity under evaluation","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"id":{"type":"integer","description":"The ID of this evaluation","example":123,"format":"int64"},"input":{"type":"string","description":"The input provided at evaluation time","example":"","format":"binary"},"org_id":{"type":"string","description":"The Harness organisation in which the evaluation was performed","example":"test-org"},"project_id":{"type":"string","description":"The Harness project in which the evaluation was performed","example":"test-project"},"status":{"type":"string","description":"The overall status of the evaluation indicating whether it passed","example":"error","enum":["error","warning","pass"]},"type":{"type":"string","description":"The type of the entity under evaluation","example":"pipeline"}},"description":"The result of a single evaluation","example":{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline"},"required":["id","status","entity","entity_metadata","type","action","account_id","org_id","project_id","created","input","details"]},"EvaluationCounts":{"type":"object","properties":{"error":{"type":"integer","description":"Count of evaluations that have a status of 'error'","example":4970251986521508580,"format":"int64"},"pass":{"type":"integer","description":"Count of evaluations that have a status of 'pass'","example":307083773713586752,"format":"int64"},"warning":{"type":"integer","description":"Count of evaluations that have a status of 'warning'","example":1502739105740891635,"format":"int64"}},"description":"Evaluation counts by status","example":{"error":5942734405936107822,"pass":4691718722125000343,"warning":690944801675665669},"required":["error","warning","pass"]},"EvaluationDetail":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy set","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"created":{"type":"integer","description":"Time the policy set was created","example":1636669297674,"format":"int64"},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"details":{"type":"array","items":{"$ref":"#/components/schemas/EvaluatedPolicy"},"example":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}]},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"identifier":{"type":"string","description":"Identifier of the policy set","example":"policyset-1","minLength":1},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy set","default":"","example":"test-org"},"project_id":{"type":"string","description":"Harness project ID associated with this policy set","default":"","example":"test-project"},"status":{"type":"string","description":"The overall status for this policy set indicating whether it passed","example":"error","enum":["error","warning","pass"]},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline","minLength":1},"updated":{"type":"integer","description":"Time the policy set was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},"required":["status","details","identifier","name","action","type","enabled","created","updated","account_id","org_id","project_id"]},"EvaluationDetail2":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy set","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"created":{"type":"integer","description":"Time the policy set was created","example":1636669297674,"format":"int64"},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"details":{"type":"array","items":{"$ref":"#/components/schemas/EvaluatedPolicy"},"example":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}]},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"identifier":{"type":"string","description":"Identifier of the policy set","example":"policyset-1","minLength":1},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy set","default":"","example":"test-org"},"project_id":{"type":"string","description":"Harness project ID associated with this policy set","default":"","example":"test-project"},"status":{"type":"string","description":"The overall status for this policy set indicating whether it passed","example":"error","enum":["error","warning","pass"]},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline","minLength":1},"updated":{"type":"integer","description":"Time the policy set was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},"required":["status","details"]},"GitErrorResult":{"type":"object","properties":{"explanation":{"type":"string","description":"the explanation of the error","example":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file"},"hint":{"type":"string","description":"the hint on how to resolve the error","example":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"message":{"type":"string","description":"the message is a human-readable explanation specific to this occurrence of the problem","example":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."}},"example":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"required":["message","explanation","hint"]},"LinkedPolicy":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"created":{"type":"integer","description":"Time the policy was created","example":1636669297674,"format":"int64"},"identifier":{"type":"string","description":"identifier of the policy","example":"policy-1","minLength":1},"name":{"type":"string","description":"Name of the policy","example":"Pipeline Approval","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy","default":"","example":"test-org"},"project_id":{"type":"string","description":"Harness project ID associated with this policy","default":"","example":"test-project"},"rego":{"type":"string","description":"Rego that defines the policy","example":"","minLength":1},"severity":{"type":"string","description":"The severity of this policy in this context","example":"warning","enum":["warning","error"]},"updated":{"type":"integer","description":"Time the policy was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},"required":["account_id","org_id","project_id","identifier","name","severity"]},"LinkedPolicy2":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"created":{"type":"integer","description":"Time the policy was created","example":1636669297674,"format":"int64"},"identifier":{"type":"string","description":"identifier of the policy","example":"policy-1","minLength":1},"name":{"type":"string","description":"Name of the policy","example":"Pipeline Approval","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy","default":"","example":"test-org"},"project_id":{"type":"string","description":"Harness project ID associated with this policy","default":"","example":"test-project"},"rego":{"type":"string","description":"Rego that defines the policy","example":"","minLength":1},"severity":{"type":"string","description":"The severity of this policy in this context","example":"warning","enum":["warning","error"]},"updated":{"type":"integer","description":"Time the policy was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},"required":["account_id","org_id","project_id","identifier","name","severity","rego","created","updated"]},"Linkedpolicyidentifier":{"type":"object","properties":{"identifier":{"type":"string","description":"identifier of the policy with account. or org. prefix if needed","example":"policy-1","minLength":1},"severity":{"type":"string","description":"The severity of this policy in this context","example":"warning","enum":["warning","error"]}},"example":{"identifier":"policy-1","severity":"warning"},"required":["identifier","severity"]},"Policy":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"created":{"type":"integer","description":"Time the policy was created","example":1636669297674,"format":"int64"},"git_commit_sha":{"type":"string","description":"The commit sha of the commit that last effected the file","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"git_connector_ref":{"type":"string","description":"The harness connector used for authenticating on the git provider","example":"."},"git_default_branch":{"type":"string","description":"The default branch, the service pulls in changes from from this branch for policy evaluation","example":"main"},"git_default_branch_update_error":{"$ref":"#/components/schemas/GitErrorResult"},"git_default_branch_updated":{"type":"integer","description":"The last time the service successfully pulled in changes from the default branch","example":1636669297674,"format":"int64"},"git_file_id":{"type":"string","description":"The file if od the bile being updated","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"git_file_url":{"type":"string","description":"The url of the file on the fit provider","example":""},"git_path":{"type":"string","description":"The path to the file in the git repo","example":".harness/policy.rego"},"git_repo":{"type":"string","description":"The git repo the policy resides in","example":"github.com/org/repo,omitempty"},"identifier":{"type":"string","description":"identifier of the policy","example":"policy-1","minLength":1},"name":{"type":"string","description":"Name of the policy","example":"Pipeline Approval","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy","default":"","example":"test-org"},"project_id":{"type":"string","description":"Harness project ID associated with this policy","default":"","example":"test-project"},"rego":{"type":"string","description":"Rego that defines the policy","example":"","minLength":1},"updated":{"type":"integer","description":"Time the policy was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"required":["identifier","name","rego","created","updated","account_id","org_id","project_id"]},"PolicyExample":{"type":"object","properties":{"desc":{"type":"string","description":"Longer description of the example","example":"This is a pipeline example"},"input":{"type":"string","description":"Example input to illustrate the rego policy","example":"{\"message\": \"everyone\"}"},"name":{"type":"string","description":"Example name","example":"Pipeline example"},"rego":{"type":"string","description":"Example rego policy","example":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"},"type":{"type":"string","description":"The type of entity illustrated in this example","example":"pipeline"}},"description":"Example policies and input","example":{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline"},"required":["name","desc","type","rego","input"]},"PolicyHealth":{"type":"object","properties":{"total_evaluation_count":{"type":"integer","description":"Total number of evaluations that have occurred","example":3106114819850014595,"format":"int64"},"total_evaluation_entity_count":{"$ref":"#/components/schemas/EvaluationCounts"},"total_policy_count":{"type":"integer","description":"Total number of policies stored","example":260032344239716986,"format":"int64"},"total_policy_set_count":{"type":"integer","description":"Total number of policy sets stored","example":8273115386678935454,"format":"int64"},"total_policy_set_entity_count":{"type":"object","description":"Total number of policy sets by type","example":{"Nihil beatae ut.":3419870533551795433,"Officiis eum.":2401905417790433514,"Ut et.":1271161779457622586},"additionalProperties":{"type":"integer","example":1071228818264538870,"format":"int64"}}},"description":"Policy health metrics","example":{"total_evaluation_count":1514701763360421536,"total_evaluation_entity_count":{"error":4962770580155356801,"pass":1838564234748219477,"warning":6712404284550845579},"total_policy_count":8782150527953946519,"total_policy_set_count":137249694436592402,"total_policy_set_entity_count":{"Sequi asperiores molestiae quia architecto reprehenderit.":8689723557954075770,"Voluptate eos.":5766037194807765246}},"required":["total_policy_count","total_policy_set_count","total_policy_set_entity_count","total_evaluation_count","total_evaluation_entity_count"]},"PolicySet":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy set","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"created":{"type":"integer","description":"Time the policy set was created","example":1636669297674,"format":"int64"},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"identifier":{"type":"string","description":"Identifier of the policy set","example":"policyset-1","minLength":1},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy set","default":"","example":"test-org"},"policies":{"type":"array","items":{"$ref":"#/components/schemas/LinkedPolicy"},"description":"Policies linked to this policy set","example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}]},"project_id":{"type":"string","description":"Harness project ID associated with this policy set","default":"","example":"test-project"},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline","minLength":1},"updated":{"type":"integer","description":"Time the policy set was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","type":"pipeline","updated":1636669297674},"required":["identifier","name","action","type","enabled","created","updated","account_id","org_id","project_id"]},"PolicySet2":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy set","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"created":{"type":"integer","description":"Time the policy set was created","example":1636669297674,"format":"int64"},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"identifier":{"type":"string","description":"Identifier of the policy set","example":"policyset-1","minLength":1},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy set","default":"","example":"test-org"},"policies":{"type":"array","items":{"$ref":"#/components/schemas/LinkedPolicy2"},"description":"Policies linked to this policy set","example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}]},"project_id":{"type":"string","description":"Harness project ID associated with this policy set","default":"","example":"test-project"},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline","minLength":1},"updated":{"type":"integer","description":"Time the policy set was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","type":"pipeline","updated":1636669297674},"required":["identifier","name","action","type","enabled","created","updated","account_id","org_id","project_id"]},"ServiceVersion":{"type":"object","properties":{"commit":{"type":"string","description":"Build identifier","example":"96381692bf3a2bd7904769c6886e832435768b57"},"version":{"type":"string","description":"Version number","example":"v0.123.0"}},"example":{"commit":"96381692bf3a2bd7904769c6886e832435768b57","version":"v0.123.0"},"required":["version","commit"]},"UpdateRequestBody":{"type":"object","properties":{"name":{"type":"string","description":"The name of the policy","example":"Check that an approval step is present"},"rego":{"type":"string","description":"The rego that defines the policy policy","example":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}},"example":{"name":"Check that an approval step is present","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}},"UpdateRequestBody2":{"type":"object","properties":{"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies"},"policies":{"type":"array","items":{"$ref":"#/components/schemas/Linkedpolicyidentifier"},"description":"Policies linked to this policy set","example":[{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"}]},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline"}},"example":{"action":"onrun","description":"Captures critical production policies","enabled":true,"name":"Production Policies","policies":[{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"}],"type":"pipeline"}}},"securitySchemes":{"api_key_header_x-api-key":{"type":"apiKey","description":"Harness PAT","name":"x-api-key","in":"header"},"jwt_header_Authorization":{"type":"http","scheme":"bearer"}}},"tags":[{"name":"dashboard","description":"Aggregate summary of policies, policy sets and evaluations for display on the dashboard"},{"name":"examples","description":"Example rego policies and corresponding input"},{"name":"policies","description":"Create, edit and delete Governance policies written in rego"},{"name":"evaluate","description":"Perform evaluations"},{"name":"evaluations","description":"Access evaluation results"},{"name":"policysets","description":"Create, edit and delete Governance policy sets"},{"name":"system","description":"System version and health"}]} \ No newline at end of file +{"openapi":"3.0.3","info":{"title":"Governance Policy Management API","description":"Read and manage OPA Governance policies, policy sets and evaluations","version":"1.2.0"},"servers":[{"url":"https://app.harness.io/gateway/pm/"}],"paths":{"/api/v1/aida/analyze":{"post":{"tags":["aida"],"description":"Describe Policy On Basis of rego","operationId":"aida#analyze","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Et labore laudantium asperiores enim nesciunt."},"example":"Voluptas consequuntur aliquid accusantium."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/AnalyzeRequestBody"},"example":{"entityType":"encryptedJsonData example","rego":"query example"}}}},"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/AnalyzeResponse"},"example":{"desc":"policy example","status":"SUCCESS"}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/aida/generate":{"post":{"tags":["aida"],"description":"Generate Policy On Basis of free Text","operationId":"aida#generate","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Recusandae quisquam sunt veritatis id occaecati et."},"example":"Explicabo qui repellat."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/GenerateRequestBody"},"example":{"policyData":"encryptedJsonData example","query":"query example"}}}},"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/PolicySample"},"example":{"policy":"policy example","status":"SUCCESS"}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/dashboard":{"get":{"tags":["dashboard"],"description":"Get metrics about policies, policy sets and evaluations","operationId":"dashboard#metrics","parameters":[{"name":"range","in":"query","description":"The time period over which to aggregate dashboard data. Can be: 24 hours, 7 days or 30 days","allowEmptyValue":true,"schema":{"type":"string","description":"The time period over which to aggregate dashboard data. Can be: 24 hours, 7 days or 30 days","default":"30d","example":"30d","enum":["24h","7d","30d"]},"example":"30d"},{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Ea dolores voluptatem et optio sit minus."},"example":"Rerum voluptas explicabo voluptatem iusto voluptatem nihil."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/DashboardMetrics"},"example":{"aggregates":[{"error":7047330649455918569,"pass":5978409892349166329,"time":3842596383256885522,"warning":7820734117944797579},{"error":7047330649455918569,"pass":5978409892349166329,"time":3842596383256885522,"warning":7820734117944797579}],"policy_health":{"total_evaluation_count":6897252924146464223,"total_evaluation_entity_count":{"error":76024433486172609,"pass":4127438089508318555,"warning":511376631733875378},"total_policy_count":2312323563280819911,"total_policy_set_count":5354236275073299085,"total_policy_set_entity_count":{"Possimus corporis doloremque nihil hic exercitationem.":2751085338469200587}}}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/evaluate":{"post":{"tags":["evaluate"],"description":"Evaluate arbitrary rego","operationId":"evaluate#evaluate","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Laboriosam magni inventore id ipsa."},"example":"Consequatur recusandae voluptatem sit unde excepturi nesciunt."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/EvaluateRequestBody"},"example":{"input":"{\"message\": \"everyone\"}","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}}}},"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/EvaluatedPolicy"},"example":{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}}}},"400":{"description":"PolicySetNotFound: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/evaluate-by-ids":{"post":{"tags":["evaluate"],"description":"Evaluate policy sets by ID","operationId":"evaluate#evaluate-by-ids","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"entity","in":"query","description":"User-supplied global identifier of the entity under evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"User-supplied global identifier of the entity under evaluation","default":"","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},{"name":"entityMetadata","in":"query","description":"User-supplied additional metadata for the entity under evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"User-supplied additional metadata for the entity under evaluation","default":"","example":"{\"name\":\"test-entity\"}"},"example":"{\"name\":\"test-entity\"}"},{"name":"principalIdentifier","in":"query","description":"Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType'","allowEmptyValue":true,"schema":{"type":"string","description":"Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType'","default":"","example":"aaabbbcccddd"},"example":"aaabbbcccddd"},{"name":"principalType","in":"query","description":"Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier'","allowEmptyValue":true,"schema":{"type":"string","description":"Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier'","default":"","example":"USER"},"example":"USER"},{"name":"userIdentifier","in":"query","description":"Deprecated: Please use 'principalIdentifier' and 'principalType' instead","allowEmptyValue":true,"schema":{"type":"string","description":"Deprecated: Please use 'principalIdentifier' and 'principalType' instead","default":"","example":"Quis expedita et labore dolorem et."},"example":"Provident autem ut dolor."},{"name":"ids","in":"query","description":"Comma-separated list of identifiers for the policy sets that should be evaluated, with account. or org. prefixes if needed","allowEmptyValue":true,"required":true,"schema":{"type":"string","description":"Comma-separated list of identifiers for the policy sets that should be evaluated, with account. or org. prefixes if needed","example":"policyset-1,policyset-2,policyset-3","minLength":1},"example":"policyset-1,policyset-2,policyset-3"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Aut accusantium."},"example":"Vel culpa dolorem mollitia qui sequi aliquam."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Evaluation"},"example":{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"}}}},"400":{"description":"PolicySetNotFound: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/evaluate-by-type":{"post":{"tags":["evaluate"],"description":"Evaluate all policy sets of a specified type","operationId":"evaluate#evaluate-by-type","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"entity","in":"query","description":"User-supplied global identifier of the entity under evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"User-supplied global identifier of the entity under evaluation","default":"","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},{"name":"entityMetadata","in":"query","description":"User-supplied additional metadata for the entity under evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"User-supplied additional metadata for the entity under evaluation","default":"","example":"{\"name\":\"test-entity\"}"},"example":"{\"name\":\"test-entity\"}"},{"name":"type","in":"query","description":"Type of entity under evaluation","allowEmptyValue":true,"required":true,"schema":{"type":"string","description":"Type of entity under evaluation","example":"pipeline","minLength":1},"example":"pipeline"},{"name":"action","in":"query","description":"Action that triggered the evaluation","allowEmptyValue":true,"required":true,"schema":{"type":"string","description":"Action that triggered the evaluation","example":"onrun","minLength":1},"example":"onrun"},{"name":"principalIdentifier","in":"query","description":"Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType'","allowEmptyValue":true,"schema":{"type":"string","description":"Identifier of the principal that triggered the evaluation - must be specified in conjunction with 'principalType'","default":"","example":"aaabbbcccddd"},"example":"aaabbbcccddd"},{"name":"principalType","in":"query","description":"Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier'","allowEmptyValue":true,"schema":{"type":"string","description":"Type of principal that triggered the evaluation - must be specified in conjunction with 'principalIdentifier'","default":"","example":"USER"},"example":"USER"},{"name":"userIdentifier","in":"query","description":"Deprecated: Please use 'principalIdentifier' and 'principalType' instead","allowEmptyValue":true,"schema":{"type":"string","description":"Deprecated: Please use 'principalIdentifier' and 'principalType' instead","default":"","example":"Ut suscipit error."},"example":"Numquam dolor quibusdam tenetur."},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Optio odit ea deserunt praesentium temporibus."},"example":"Eveniet et sunt."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Evaluation"},"example":{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"}}}},"400":{"description":"PolicySetNotFound: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/evaluate-by-type-check":{"get":{"tags":["evaluate"],"summary":"evaluate-by-type-check evaluate","description":"Returns true if there are policies to evaluate for the given type, action and acc/org/proj scope.","operationId":"evaluate#evaluate-by-type-check","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"type","in":"query","description":"Type of entity under evaluation","allowEmptyValue":true,"required":true,"schema":{"type":"string","description":"Type of entity under evaluation","example":"pipeline","minLength":1},"example":"pipeline"},{"name":"action","in":"query","description":"Action that triggered the evaluation","allowEmptyValue":true,"required":true,"schema":{"type":"string","description":"Action that triggered the evaluation","example":"onrun","minLength":1},"example":"onrun"},{"name":"entity","in":"query","description":"User-supplied global identifier of the entity under evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"User-supplied global identifier of the entity under evaluation","default":"","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Dolor dolorem odit nihil consequatur."},"example":"Voluptatem nisi illo sapiente dolor repellat."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/EvaluateByTypeCheckResponseBody"},"example":{"should_evaluate":false}}}},"400":{"description":"PolicySetNotFound: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/evaluations":{"get":{"tags":["evaluations"],"description":"List evaluations","operationId":"evaluations#list","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"per_page","in":"query","description":"Number of results per page","allowEmptyValue":true,"schema":{"type":"integer","description":"Number of results per page","default":50,"example":20,"minimum":1,"maximum":100},"example":20},{"name":"page","in":"query","description":"Page number (starting from 0)","allowEmptyValue":true,"schema":{"type":"integer","description":"Page number (starting from 0)","default":0,"example":4,"minimum":0},"example":4},{"name":"entity","in":"query","description":"Filter by the entity associated with the evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"Filter by the entity associated with the evaluation","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},{"name":"type","in":"query","description":"Filter by the type associated with the evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"Filter by the type associated with the evaluation","example":"pipeline"},"example":"pipeline"},{"name":"action","in":"query","description":"Filter by the action associated with the evaluation","allowEmptyValue":true,"schema":{"type":"string","description":"Filter by the action associated with the evaluation","example":"onrun"},"example":"onrun"},{"name":"last_seen","in":"query","description":"Retrieve results starting after this last-seen result","allowEmptyValue":true,"schema":{"type":"integer","description":"Retrieve results starting after this last-seen result","example":123,"format":"int64"},"example":123},{"name":"created_date_from","in":"query","description":"Retrieve results created from this date","allowEmptyValue":true,"schema":{"type":"integer","description":"Retrieve results created from this date","example":123,"format":"int64"},"example":123},{"name":"created_date_to","in":"query","description":"Retrieve results created up to this date","allowEmptyValue":true,"schema":{"type":"integer","description":"Retrieve results created up to this date","example":123,"format":"int64"},"example":123},{"name":"status","in":"query","description":"Retrieve results with these statuses","allowEmptyValue":true,"schema":{"type":"string","description":"Retrieve results with these statuses","example":"SUCCESS,WARNING,FAILED"},"example":"SUCCESS,WARNING,FAILED"},{"name":"includeChildScopes","in":"query","description":"When true, evaluations from child scopes will be inculded in the results","allowEmptyValue":true,"schema":{"type":"boolean","description":"When true, evaluations from child scopes will be inculded in the results","default":false,"example":true},"example":false},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Minima dolorum."},"example":"Iusto eos voluptates est maiores."}],"responses":{"200":{"description":"OK response.","headers":{"Link":{"description":"Link-based paging","required":true,"schema":{"type":"string","description":"Link-based paging","example":""},"example":""},"X-Page-Index":{"description":"Page number","required":true,"schema":{"type":"integer","description":"Page number","example":4,"format":"int64"},"example":4},"X-Page-Item-Count":{"description":"Number of results in this page","required":true,"schema":{"type":"integer","description":"Number of results in this page","example":20,"format":"int64"},"example":20},"X-Page-Size":{"description":"Requested page size","required":true,"schema":{"type":"integer","description":"Requested page size","example":20,"format":"int64"},"example":20},"X-Total-Items":{"description":"Total results available","required":true,"schema":{"type":"integer","description":"Total results available","example":230,"format":"int64"},"example":230},"X-Total-Pages":{"description":"Total pages available","required":true,"schema":{"type":"integer","description":"Total pages available","example":12,"format":"int64"},"example":12}},"content":{"application/json":{"schema":{"type":"array","items":{"$ref":"#/components/schemas/Evaluation"},"example":[{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"},{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"},{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"}]},"example":[{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"},{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"},{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"},{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"}]}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/evaluations/{id}":{"get":{"tags":["evaluations"],"description":"Find an evaluation by ID","operationId":"evaluations#find","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"id","in":"path","description":"The ID of the evaluation to retrieve","required":true,"schema":{"type":"integer","description":"The ID of the evaluation to retrieve","example":123,"format":"int64"},"examples":{"default":{"summary":"default","value":123}}},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Occaecati facere consequatur."},"example":"Eum velit sunt eum odio."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Evaluation"},"example":{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/examples":{"get":{"tags":["examples"],"description":"list examples","operationId":"examples#list","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Repellendus corrupti."},"example":"Voluptate quia voluptatem."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"type":"array","items":{"$ref":"#/components/schemas/PolicyExample"},"example":[{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline","variables":[{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]}]},{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline","variables":[{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]}]}]},"example":[{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline","variables":[{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]}]},{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline","variables":[{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]}]}]}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/policies":{"get":{"tags":["policies"],"description":"List all policies","operationId":"policies#list","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"per_page","in":"query","description":"Number of results per page","allowEmptyValue":true,"schema":{"type":"integer","description":"Number of results per page","default":50,"example":20,"minimum":1,"maximum":100},"example":20},{"name":"page","in":"query","description":"Page number (starting from 0)","allowEmptyValue":true,"schema":{"type":"integer","description":"Page number (starting from 0)","default":0,"example":4,"minimum":0},"example":4},{"name":"searchTerm","in":"query","description":"Filter results by partial name match","allowEmptyValue":true,"schema":{"type":"string","description":"Filter results by partial name match","default":"","example":"poli"},"example":"poli"},{"name":"sort","in":"query","description":"Sort order for results","allowEmptyValue":true,"schema":{"type":"string","description":"Sort order for results","default":"name,ASC","example":"updated,DESC","enum":["name,ASC","name,DESC","updated,ASC","updated,DESC"]},"example":"name,ASC"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Voluptatem quos assumenda blanditiis."},"example":"Modi molestias natus."}],"responses":{"200":{"description":"OK response.","headers":{"Link":{"description":"Link-based paging","required":true,"schema":{"type":"string","description":"Link-based paging","example":""},"example":""},"X-Page-Index":{"description":"Page number","required":true,"schema":{"type":"integer","description":"Page number","example":4,"format":"int64"},"example":4},"X-Page-Item-Count":{"description":"Number of results in this page","required":true,"schema":{"type":"integer","description":"Number of results in this page","example":20,"format":"int64"},"example":20},"X-Page-Size":{"description":"Requested page size","required":true,"schema":{"type":"integer","description":"Requested page size","example":20,"format":"int64"},"example":20},"X-Total-Items":{"description":"Total results available","required":true,"schema":{"type":"integer","description":"Total results available","example":230,"format":"int64"},"example":230},"X-Total-Pages":{"description":"Total pages available","required":true,"schema":{"type":"integer","description":"Total pages available","example":12,"format":"int64"},"example":12}},"content":{"application/json":{"schema":{"type":"array","items":{"$ref":"#/components/schemas/Policy"},"example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674}]},"example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674}]}}},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"post":{"tags":["policies"],"description":"Create a policy","operationId":"policies#create","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"git_commit_msg","in":"query","description":"The commit message used in git when creating the policy","allowEmptyValue":true,"schema":{"type":"string","description":"The commit message used in git when creating the policy","example":"harness policy commit msg"},"example":"harness policy commit msg"},{"name":"git_import","in":"query","description":"A flag to determine if the api should try and import and existing policy from git","allowEmptyValue":true,"schema":{"type":"boolean","description":"A flag to determine if the api should try and import and existing policy from git","example":true},"example":true},{"name":"git_branch","in":"query","description":"The git branch the policy will be created in","allowEmptyValue":true,"schema":{"type":"string","description":"The git branch the policy will be created in","example":"main"},"example":"main"},{"name":"git_is_new_branch","in":"query","description":"A flag to determine if the api should try and commit to a new branch","allowEmptyValue":true,"schema":{"type":"boolean","description":"A flag to determine if the api should try and commit to a new branch","example":true},"example":true},{"name":"git_base_branch","in":"query","description":"If committing to a new branch, git_base_branch tells the api which branch to base the new branch from","allowEmptyValue":true,"schema":{"type":"string","description":"If committing to a new branch, git_base_branch tells the api which branch to base the new branch from","example":"main"},"example":"main"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Dolor nam impedit sunt sint."},"example":"Est dolorum molestias."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/CreateRequestBody"},"example":{"git_connector_ref":".","git_path":".harness/policy.rego","git_repo":"github.com/org/repo","identifier":"policy-1","name":"Check that an approval step is present","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}}}},"responses":{"201":{"description":"Created response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Policy"},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674}}}},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/policies/{identifier}":{"delete":{"tags":["policies"],"description":"Delete a policy by identifier","operationId":"policies#delete","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"identifier","in":"path","description":"Identifier of the policy","required":true,"schema":{"type":"string","description":"Identifier of the policy","example":"policy-1","minLength":1},"examples":{"default":{"summary":"default","value":"policy-1"}}},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Labore quia assumenda nobis in."},"example":"Tempora accusantium praesentium ratione aperiam facere iusto."}],"responses":{"204":{"description":"No Content response."},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"get":{"tags":["policies"],"description":"Find a policy by identifier","operationId":"policies#find","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"git_branch","in":"query","description":"The git branch the policy resides in","allowEmptyValue":true,"schema":{"type":"string","description":"The git branch the policy resides in","example":"main"},"example":"main"},{"name":"show_summary","in":"query","description":"Setting to true returns the metadata about the\n\t\t\t requested policy including the information held about the status of this policy in the default branch.\n\t\t\t git_branch is ignored as no git operation takes place.","allowEmptyValue":true,"schema":{"type":"boolean","description":"Setting to true returns the metadata about the\n\t\t\t requested policy including the information held about the status of this policy in the default branch.\n\t\t\t git_branch is ignored as no git operation takes place.","example":true},"example":true},{"name":"identifier","in":"path","description":"Identifier of the policy to retrieve","required":true,"schema":{"type":"string","description":"Identifier of the policy to retrieve","example":"policy-1","minLength":1},"examples":{"default":{"summary":"default","value":"policy-1"}}},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Molestiae accusantium."},"example":"Fugit ut qui voluptatem ea et at."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Policy"},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674}}}},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"patch":{"tags":["policies"],"description":"Update a policy by identifier","operationId":"policies#update","parameters":[{"name":"git_commit_msg","in":"query","description":"The commit message used in git when creating the policy","allowEmptyValue":true,"schema":{"type":"string","description":"The commit message used in git when creating the policy","example":"harness policy commit msg"},"example":"harness policy commit msg"},{"name":"git_is_new_branch","in":"query","description":"A flag to determine if the api should try and commit to a new branch","allowEmptyValue":true,"schema":{"type":"boolean","description":"A flag to determine if the api should try and commit to a new branch","example":true},"example":true},{"name":"git_base_branch","in":"query","description":"If committing to a new branch, git_base_branch tells the api which branch to base the new branch from","allowEmptyValue":true,"schema":{"type":"string","description":"If committing to a new branch, git_base_branch tells the api which branch to base the new branch from","example":"main"},"example":"main"},{"name":"git_branch","in":"query","description":"The git branch the policy resides in","allowEmptyValue":true,"schema":{"type":"string","description":"The git branch the policy resides in","example":"main"},"example":"main"},{"name":"git_commit_sha","in":"query","description":"The existing commit sha of the file being updated","allowEmptyValue":true,"schema":{"type":"string","description":"The existing commit sha of the file being updated","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},{"name":"git_file_id","in":"query","description":"The existing file id of the file being updated, not required for bitbucket files","allowEmptyValue":true,"schema":{"type":"string","description":"The existing file id of the file being updated, not required for bitbucket files","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"identifier","in":"path","description":"Identifier of the policy","required":true,"schema":{"type":"string","description":"Identifier of the policy","example":"policy-1"},"example":"policy-1"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Tempore non beatae suscipit qui qui."},"example":"Fuga maiores excepturi voluptates architecto."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/UpdateRequestBody"},"example":{"name":"Check that an approval step is present","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}}}},"responses":{"204":{"description":"No Content response."},"400":{"description":"GitError: Bad Request response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/policysets":{"get":{"tags":["policysets"],"description":"List all policy sets","operationId":"policysets#list","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"per_page","in":"query","description":"Number of results per page","allowEmptyValue":true,"schema":{"type":"integer","description":"Number of results per page","default":50,"example":20,"minimum":1,"maximum":100},"example":20},{"name":"page","in":"query","description":"Page number (starting from 0)","allowEmptyValue":true,"schema":{"type":"integer","description":"Page number (starting from 0)","default":0,"example":4,"minimum":0},"example":4},{"name":"searchTerm","in":"query","description":"Filter results by partial name match","allowEmptyValue":true,"schema":{"type":"string","description":"Filter results by partial name match","default":"","example":"poli"},"example":"poli"},{"name":"sort","in":"query","description":"Sort order for results","allowEmptyValue":true,"schema":{"type":"string","description":"Sort order for results","default":"name,ASC","example":"updated,ASC","enum":["name,ASC","name,DESC","updated,ASC","updated,DESC"]},"example":"name,DESC"},{"name":"type","in":"query","description":"Filter results by type","allowEmptyValue":true,"schema":{"type":"string","description":"Filter results by type","example":"pipeline","minLength":1},"example":"pipeline"},{"name":"action","in":"query","description":"Filter results by action","allowEmptyValue":true,"schema":{"type":"string","description":"Filter results by action","example":"onrun","minLength":1},"example":"onrun"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Cupiditate qui minus molestias aspernatur."},"example":"Velit maxime repudiandae velit dolores itaque neque."}],"responses":{"200":{"description":"OK response.","headers":{"Link":{"description":"Link-based paging","required":true,"schema":{"type":"string","description":"Link-based paging","example":""},"example":""},"X-Page-Index":{"description":"Page number","required":true,"schema":{"type":"integer","description":"Page number","example":4,"format":"int64"},"example":4},"X-Page-Item-Count":{"description":"Number of results in this page","required":true,"schema":{"type":"integer","description":"Number of results in this page","example":20,"format":"int64"},"example":20},"X-Page-Size":{"description":"Requested page size","required":true,"schema":{"type":"integer","description":"Requested page size","example":20,"format":"int64"},"example":20},"X-Total-Items":{"description":"Total results available","required":true,"schema":{"type":"integer","description":"Total results available","example":230,"format":"int64"},"example":230},"X-Total-Pages":{"description":"Total pages available","required":true,"schema":{"type":"integer","description":"Total pages available","example":12,"format":"int64"},"example":12}},"content":{"application/json":{"schema":{"type":"array","items":{"$ref":"#/components/schemas/PolicySet"},"example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}],"type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}],"type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}],"type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}],"type":"pipeline","updated":1636669297674}]},"example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}],"type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}],"type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}],"type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}],"type":"pipeline","updated":1636669297674}]}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"post":{"tags":["policysets"],"description":"Create a policy set","operationId":"policysets#create","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Modi quia est vel."},"example":"Voluptas et repudiandae sint fugit consequatur sunt."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/CreateRequestBody2"},"example":{"action":"onrun","description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","type":"pipeline"}}}},"responses":{"201":{"description":"Created response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/PolicySet"},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Natus in voluptatibus eum.","created":8207205165608517655,"identifier":"Alias quaerat accusamus aut voluptatem illo voluptate.","name":"Dolor voluptatibus error quia dolores molestiae.","org_id":"Accusantium sed.","project_id":"Officiis voluptatem corrupti amet porro."},{"account_id":"Natus in voluptatibus eum.","created":8207205165608517655,"identifier":"Alias quaerat accusamus aut voluptatem illo voluptate.","name":"Dolor voluptatibus error quia dolores molestiae.","org_id":"Accusantium sed.","project_id":"Officiis voluptatem corrupti amet porro."},{"account_id":"Natus in voluptatibus eum.","created":8207205165608517655,"identifier":"Alias quaerat accusamus aut voluptatem illo voluptate.","name":"Dolor voluptatibus error quia dolores molestiae.","org_id":"Accusantium sed.","project_id":"Officiis voluptatem corrupti amet porro."},{"account_id":"Natus in voluptatibus eum.","created":8207205165608517655,"identifier":"Alias quaerat accusamus aut voluptatem illo voluptate.","name":"Dolor voluptatibus error quia dolores molestiae.","org_id":"Accusantium sed.","project_id":"Officiis voluptatem corrupti amet porro."}],"type":"pipeline","updated":1636669297674}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/policysets/{identifier}":{"delete":{"tags":["policysets"],"description":"Delete a policy set by identifier","operationId":"policysets#delete","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"identifier","in":"path","description":"Identifier of the policy set","required":true,"schema":{"type":"string","description":"Identifier of the policy set","example":"policyset-1","minLength":1},"examples":{"default":{"summary":"default","value":"policyset-1"}}},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Temporibus omnis incidunt."},"example":"Libero perspiciatis quidem dolorem."}],"responses":{"204":{"description":"No Content response."},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"get":{"tags":["policysets"],"description":"Find a policy set by identifier","operationId":"policysets#find","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"identifier","in":"path","description":"Identifier of the policy set to retrieve","required":true,"schema":{"type":"string","description":"Identifier of the policy set to retrieve","example":"policyset-1","minLength":1},"examples":{"default":{"summary":"default","value":"policyset-1"}}},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Molestiae nobis."},"example":"Eos et neque debitis."}],"responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/PolicySet"},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_resource_groups","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Natus in voluptatibus eum.","created":8207205165608517655,"identifier":"Alias quaerat accusamus aut voluptatem illo voluptate.","name":"Dolor voluptatibus error quia dolores molestiae.","org_id":"Accusantium sed.","project_id":"Officiis voluptatem corrupti amet porro."},{"account_id":"Natus in voluptatibus eum.","created":8207205165608517655,"identifier":"Alias quaerat accusamus aut voluptatem illo voluptate.","name":"Dolor voluptatibus error quia dolores molestiae.","org_id":"Accusantium sed.","project_id":"Officiis voluptatem corrupti amet porro."},{"account_id":"Natus in voluptatibus eum.","created":8207205165608517655,"identifier":"Alias quaerat accusamus aut voluptatem illo voluptate.","name":"Dolor voluptatibus error quia dolores molestiae.","org_id":"Accusantium sed.","project_id":"Officiis voluptatem corrupti amet porro."}],"type":"pipeline","updated":1636669297674}}}},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]},"patch":{"tags":["policysets"],"description":"Update a policy set by identifier","operationId":"policysets#update","parameters":[{"name":"accountIdentifier","in":"query","description":"Harness account ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness account ID","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"example":"eBqAoNchMLKigC_qZ5EdC"},{"name":"orgIdentifier","in":"query","description":"Harness organization ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness organization ID","default":"","example":"test-org"},"example":"test-org"},{"name":"projectIdentifier","in":"query","description":"Harness project ID","allowEmptyValue":true,"schema":{"type":"string","description":"Harness project ID","default":"","example":"test-project"},"example":"test-project"},{"name":"identifier","in":"path","description":"Identifier of the policy set","required":true,"schema":{"type":"string","description":"Identifier of the policy set","example":"policyset-1"},"example":"policyset-1"},{"name":"x-api-key","in":"header","description":"Harness PAT key used to perform authorization","allowEmptyValue":true,"schema":{"type":"string","description":"Harness PAT key used to perform authorization","example":"Qui id."},"example":"Et quia quibusdam quia."}],"requestBody":{"required":true,"content":{"application/json":{"schema":{"$ref":"#/components/schemas/UpdateRequestBody2"},"example":{"action":"onrun","description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","name":"Production Policies","policies":[{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"}],"resource_groups":[{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."},{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."},{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."},{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."}],"type":"pipeline"}}}},"responses":{"204":{"description":"No Content response."},"400":{"description":"BadRequest: Bad Request response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"401":{"description":"Unauthorized: Unauthorized response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"403":{"description":"Forbidden: Forbidden response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"404":{"description":"NotFound: Not Found response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}},"security":[{"jwt_header_Authorization":["core_governancePolicy_view","core_governancePolicy_edit","core_governancePolicy_delete","core_governancePolicySets_view","core_governancePolicySets_edit","core_governancePolicySets_delete","core_governancePolicySets_evaluate","core_governance_admin"]},{"api_key_header_x-api-key":[]}]}},"/api/v1/system/health":{"get":{"tags":["system"],"description":"Check service health","operationId":"system#health","responses":{"204":{"description":"No Content response."},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}}}},"/api/v1/system/version":{"get":{"tags":["system"],"description":"Check service version","operationId":"system#version","responses":{"200":{"description":"OK response.","content":{"application/json":{"schema":{"$ref":"#/components/schemas/ServiceVersion"},"example":{"commit":"96381692bf3a2bd7904769c6886e832435768b57","version":"v0.123.0"}}}},"500":{"description":"InternalServer: Internal Server Error response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}},"502":{"description":"BadGateway: Bad Gateway response.","content":{"application/vnd.goa.error":{"schema":{"$ref":"#/components/schemas/Error"}}}}}}}},"components":{"schemas":{"AggregateStatus":{"type":"object","properties":{"error":{"type":"integer","description":"Count of evaluations that have a status of 'error'","example":2145947970278403974,"format":"int64"},"pass":{"type":"integer","description":"Count of evaluations that have a status of 'pass'","example":1566636922489795804,"format":"int64"},"time":{"type":"integer","description":"The Unix time of this particular aggregation","example":6444281447444376236,"format":"int64"},"warning":{"type":"integer","description":"Count of evaluations that have a status of 'warning'","example":3822979756498340663,"format":"int64"}},"description":"Aggregate metrics for evaluations on a single day","example":{"error":7485873470259043471,"pass":7518284088002695828,"time":1258329275222359809,"warning":7009721869929871245},"required":["time","error","warning","pass"]},"AnalyzeRequestBody":{"type":"object","properties":{"entityType":{"type":"string","description":"Type of entity on which rego is written on","example":"encryptedJsonData example"},"rego":{"type":"string","description":"Rego Policy","example":"query example"}},"example":{"entityType":"encryptedJsonData example","rego":"query example"}},"AnalyzeResponse":{"type":"object","properties":{"desc":{"type":"string","description":"Build identifier","example":"policy example"},"status":{"type":"string","description":"status","example":"SUCCESS"}},"example":{"desc":"policy example","status":"SUCCESS"},"required":["status","desc"]},"CreateRequestBody":{"type":"object","properties":{"git_connector_ref":{"type":"string","description":"The harness connector used for authenticating on the git provider","example":"."},"git_path":{"type":"string","description":"The path to the file in the git repo","example":".harness/policy.rego"},"git_repo":{"type":"string","description":"The git repo the policy resides in","example":"github.com/org/repo"},"identifier":{"type":"string","description":"Identifier for the policy","example":"policy-1","minLength":1},"name":{"type":"string","description":"Name of the policy","example":"Check that an approval step is present","minLength":1},"rego":{"type":"string","description":"Rego that defines the policy policy","example":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","minLength":1}},"example":{"git_connector_ref":".","git_path":".harness/policy.rego","git_repo":"github.com/org/repo","identifier":"policy-1","name":"Check that an approval step is present","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"},"required":["name","rego","identifier","created","updated","account_id","org_id","project_id"]},"CreateRequestBody2":{"type":"object","properties":{"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"identifier":{"type":"string","description":"Identifier for the policy set","example":"policyset-1","minLength":1},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies","minLength":1},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline","minLength":1}},"example":{"action":"onrun","description":"Captures critical production policies","enabled":true,"identifier":"policyset-1","name":"Production Policies","type":"pipeline"},"required":["identifier","name","enabled","type","action","created","updated","account_id","org_id","project_id","entity_selector"]},"DashboardMetrics":{"type":"object","properties":{"aggregates":{"type":"array","items":{"$ref":"#/components/schemas/AggregateStatus"},"description":"Aggregate evaluation counts by day","example":[{"error":7047330649455918569,"pass":5978409892349166329,"time":3842596383256885522,"warning":7820734117944797579},{"error":7047330649455918569,"pass":5978409892349166329,"time":3842596383256885522,"warning":7820734117944797579}]},"policy_health":{"$ref":"#/components/schemas/PolicyHealth"}},"example":{"aggregates":[{"error":7047330649455918569,"pass":5978409892349166329,"time":3842596383256885522,"warning":7820734117944797579},{"error":7047330649455918569,"pass":5978409892349166329,"time":3842596383256885522,"warning":7820734117944797579},{"error":7047330649455918569,"pass":5978409892349166329,"time":3842596383256885522,"warning":7820734117944797579},{"error":7047330649455918569,"pass":5978409892349166329,"time":3842596383256885522,"warning":7820734117944797579}],"policy_health":{"total_evaluation_count":6897252924146464223,"total_evaluation_entity_count":{"error":76024433486172609,"pass":4127438089508318555,"warning":511376631733875378},"total_policy_count":2312323563280819911,"total_policy_set_count":5354236275073299085,"total_policy_set_entity_count":{"Possimus corporis doloremque nihil hic exercitationem.":2751085338469200587}}},"required":["policy_health","aggregates"]},"Error":{"type":"object","properties":{"fault":{"type":"boolean","description":"Is the error a server-side fault?","example":false},"id":{"type":"string","description":"ID is a unique identifier for this particular occurrence of the problem.","example":"123abc"},"message":{"type":"string","description":"Message is a human-readable explanation specific to this occurrence of the problem.","example":"parameter 'p' must be an integer"},"name":{"type":"string","description":"Name is the name of this class of errors.","example":"bad_request"},"temporary":{"type":"boolean","description":"Is the error temporary?","example":true},"timeout":{"type":"boolean","description":"Is the error a timeout?","example":false}},"example":{"id":"3F1FKVRR","message":"Value of ID must be an integer","name":"bad_request"},"required":["name","id","message","temporary","timeout","fault"]},"ErrorResultWithIdentifier":{"type":"object","properties":{"fault":{"type":"boolean","description":"Is the error a server-side fault?","example":true},"id":{"type":"string","description":"ID is a unique identifier for this particular occurrence of the problem.","example":"123abc"},"identifier":{"type":"string","description":"the identifier associated with the error","example":"policy-1"},"message":{"type":"string","description":"Message is a human-readable explanation specific to this occurrence of the problem.","example":"parameter 'p' must be an integer"},"name":{"type":"string","description":"Name is the name of this class of errors.","example":"bad_request"},"temporary":{"type":"boolean","description":"Is the error temporary?","example":true},"timeout":{"type":"boolean","description":"Is the error a timeout?","example":true}},"example":{"fault":false,"id":"123abc","identifier":"policy-1","message":"parameter 'p' must be an integer","name":"bad_request","temporary":false,"timeout":true},"required":["name","id","message","temporary","timeout","fault"]},"EvaluateByTypeCheckResponseBody":{"type":"object","properties":{"should_evaluate":{"type":"boolean","description":"Boolean value that indicates if there are policies to evaluate for the given type, action and acc/org/proj scope.","example":false}},"example":{"should_evaluate":false},"required":["should_evaluate"]},"EvaluateRequestBody":{"type":"object","properties":{"input":{"type":"string","description":"Input to evaluate","example":"{\"message\": \"everyone\"}","format":"binary"},"rego":{"type":"string","description":"Arbitrary rego to be evaluated","example":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","minLength":1}},"example":{"input":"{\"message\": \"everyone\"}","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"},"required":["rego","input"]},"EvaluatedPolicy":{"type":"object","properties":{"deny_messages":{"type":"array","items":{"type":"string","example":"Culpa quas numquam dolores repellendus distinctio omnis."},"description":"The values of any `deny` rego rules as returned by the rego engine","example":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"]},"error":{"type":"string","description":"Any errors returned by the rego engine when this policy was evaluated","example":"policy.rego:25: rego_parse_error: non-terminated string m == \"test"},"output":{"type":"string","description":"The output returned by the rego engine when this policy was evaluated","example":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","format":"binary"},"policy":{"$ref":"#/components/schemas/Policy"},"status":{"type":"string","description":"The overall status for this individual policy indicating whether it passed","example":"error","enum":["error","warning","pass"]}},"example":{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},"required":["status","policy","output","deny_messages","error"]},"Evaluation":{"type":"object","properties":{"account_id":{"type":"string","description":"The Harness account in which the evaluation was performed","example":"XRQAjvT37acOiXx9PRaQMF"},"action":{"type":"string","description":"The action that triggered evaluation","example":"onrun"},"created":{"type":"integer","description":"The time at which the evaluation was performed in Unix time millseconds","example":1636370209475,"format":"int64"},"details":{"type":"array","items":{"$ref":"#/components/schemas/EvaluationDetail"},"description":"The detailed results of te evaluation","example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}]},"entity":{"type":"string","description":"An arbtrary user-supplied string that globally identifies the entity under evaluation","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"entity_metadata":{"type":"string","description":"Additional arbtrary user-supplied metadta about the entity under evaluation","example":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e"},"id":{"type":"integer","description":"The ID of this evaluation","example":123,"format":"int64"},"input":{"type":"string","description":"The input provided at evaluation time","example":"","format":"binary"},"org_id":{"type":"string","description":"The Harness organisation in which the evaluation was performed","example":"test-org"},"project_id":{"type":"string","description":"The Harness project in which the evaluation was performed","example":"test-project"},"status":{"type":"string","description":"The overall status of the evaluation indicating whether it passed","example":"error","enum":["error","warning","pass"]},"type":{"type":"string","description":"The types of the entity under evaluation","example":"pipeline,service"}},"example":{"account_id":"XRQAjvT37acOiXx9PRaQMF","action":"onrun","created":1636370209475,"details":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674}],"entity":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","entity_metadata":"7bbca5d4-e9f2-4955-9b2a-019ec4d3645e","id":123,"input":"","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline,service"},"required":["id","status","entity","entity_metadata","type","action","account_id","org_id","project_id","created","input","details"]},"EvaluationCounts":{"type":"object","properties":{"error":{"type":"integer","description":"Count of evaluations that have a status of 'error'","example":2877065535170142137,"format":"int64"},"pass":{"type":"integer","description":"Count of evaluations that have a status of 'pass'","example":6448843135629816731,"format":"int64"},"warning":{"type":"integer","description":"Count of evaluations that have a status of 'warning'","example":5349812220259163158,"format":"int64"}},"description":"Evaluation counts by status","example":{"error":3723090062830688588,"pass":6135952462759855154,"warning":9199932466817366069},"required":["error","warning","pass"]},"EvaluationDetail":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy set","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"created":{"type":"integer","description":"Time the policy set was created","example":1636669297674,"format":"int64"},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"details":{"type":"array","items":{"$ref":"#/components/schemas/EvaluatedPolicy"},"example":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}]},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"identifier":{"type":"string","description":"Identifier of the policy set","example":"policyset-1","minLength":1},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy set","default":"","example":"test-org"},"project_id":{"type":"string","description":"Harness project ID associated with this policy set","default":"","example":"test-project"},"status":{"type":"string","description":"The overall status for this policy set indicating whether it passed","example":"error","enum":["error","warning","pass"]},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline","minLength":1},"updated":{"type":"integer","description":"Time the policy set was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","details":[{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"},{"deny_messages":["deployment stage 'example-stage' does not have a HarnessApproval step","deployment stage 'example-stage' has step 'run-script' that is forbidden type 'ShellScript'"],"error":"policy.rego:25: rego_parse_error: non-terminated string m == \"test","output":"{\n \"deny\": [\n \"deployment stage 'deploy' does not have a HarnessApproval step\"\n ],\n \"stages_with_approval\": []\n}","policy":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"status":"error"}],"enabled":true,"identifier":"policyset-1","name":"Production Policies","org_id":"test-org","project_id":"test-project","status":"error","type":"pipeline","updated":1636669297674},"required":["status","details","identifier","name","action","type","enabled","created","updated","account_id","org_id","project_id","entity_selector"]},"GenerateRequestBody":{"type":"object","properties":{"policyData":{"type":"string","description":"policySample Data","example":"encryptedJsonData example"},"query":{"type":"string","description":"Text query","example":"query example"}},"example":{"policyData":"encryptedJsonData example","query":"query example"}},"GitErrorResult":{"type":"object","properties":{"explanation":{"type":"string","description":"the explanation of the error","example":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file"},"hint":{"type":"string","description":"the hint on how to resolve the error","example":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"message":{"type":"string","description":"the message is a human-readable explanation specific to this occurrence of the problem","example":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."}},"example":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"required":["message","explanation","hint"]},"LinkedPolicy":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"created":{"type":"integer","description":"Time the policy was created","example":1636669297674,"format":"int64"},"identifier":{"type":"string","description":"identifier of the policy","example":"policy-1","minLength":1},"name":{"type":"string","description":"Name of the policy","example":"Pipeline Approval","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy","default":"","example":"test-org"},"project_id":{"type":"string","description":"Harness project ID associated with this policy","default":"","example":"test-project"},"rego":{"type":"string","description":"Rego that defines the policy","example":"","minLength":1},"severity":{"type":"string","description":"The severity of this policy in this context","example":"warning","enum":["warning","error"]},"updated":{"type":"integer","description":"Time the policy was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},"required":["account_id","org_id","project_id","identifier","name","severity","rego","created","updated"]},"Linkedpolicyidentifier":{"type":"object","properties":{"identifier":{"type":"string","description":"identifier of the policy with account. or org. prefix if needed","example":"policy-1","minLength":1},"severity":{"type":"string","description":"The severity of this policy in this context","example":"warning","enum":["warning","error"]}},"example":{"identifier":"policy-1","severity":"warning"},"required":["identifier","severity"]},"Policy":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"created":{"type":"integer","description":"Time the policy was created","example":1636669297674,"format":"int64"},"git_commit_sha":{"type":"string","description":"The commit sha of the commit that last effected the file","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"git_connector_ref":{"type":"string","description":"The harness connector used for authenticating on the git provider","example":"."},"git_default_branch":{"type":"string","description":"The default branch, the service pulls in changes from from this branch for policy evaluation","example":"main"},"git_default_branch_commit_sha":{"type":"string","description":"The commit sha of the commit that last effected the file in the default branch","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"git_default_branch_file_id":{"type":"string","description":"The file id of the file in the default branch, may be empty for bitbucket files","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"git_default_branch_file_url":{"type":"string","description":"The url of the file in the default branch","example":""},"git_default_branch_update_error":{"$ref":"#/components/schemas/GitErrorResult"},"git_default_branch_updated":{"type":"integer","description":"The last time the service successfully pulled in changes from the default branch","example":1636669297674,"format":"int64"},"git_file_id":{"type":"string","description":"The file id of the file, may be empty for bitbucket files","example":"1369b45c20fc685113adcfd1a08a914180ff3c0d"},"git_file_url":{"type":"string","description":"The url of the file on the fit provider","example":""},"git_path":{"type":"string","description":"The path to the file in the git repo","example":".harness/policy.rego"},"git_repo":{"type":"string","description":"The git repo the policy resides in","example":"github.com/org/repo,omitempty"},"identifier":{"type":"string","description":"identifier of the policy","example":"policy-1","minLength":1},"name":{"type":"string","description":"Name of the policy","example":"Pipeline Approval","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy","default":"","example":"test-org"},"project_id":{"type":"string","description":"Harness project ID associated with this policy","default":"","example":"test-project"},"rego":{"type":"string","description":"Rego that defines the policy","example":"","minLength":1},"updated":{"type":"integer","description":"Time the policy was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"git_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_connector_ref":".","git_default_branch":"main","git_default_branch_commit_sha":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_default_branch_file_url":"","git_default_branch_update_error":{"explanation":"File with given filepath [file.rego] already exists in Github, thus couldn't create a new file","hint":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main].","message":"Please check if there's already a file [file.rego] in Github repository [rego-demo] for the given filepath and branch [main]."},"git_default_branch_updated":1636669297674,"git_file_id":"1369b45c20fc685113adcfd1a08a914180ff3c0d","git_file_url":"","git_path":".harness/policy.rego","git_repo":"github.com/org/repo,omitempty","identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","updated":1636669297674},"required":["identifier","name","rego","created","updated","account_id","org_id","project_id"]},"PolicyExample":{"type":"object","properties":{"desc":{"type":"string","description":"Longer description of the example","example":"This is a pipeline example"},"input":{"type":"string","description":"Example input to illustrate the rego policy","example":"{\"message\": \"everyone\"}"},"name":{"type":"string","description":"Example name","example":"Pipeline example"},"rego":{"type":"string","description":"Example rego policy","example":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"},"type":{"type":"string","description":"The type of entity illustrated in this example","example":"pipeline"},"variables":{"type":"array","items":{"$ref":"#/components/schemas/Variable"},"description":"The list of substitutable variables in the policy example","example":[{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]}]}},"description":"Example policies and input","example":{"desc":"This is a pipeline example","input":"{\"message\": \"everyone\"}","name":"Pipeline example","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}","type":"pipeline","variables":[{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]},{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]}]},"required":["name","desc","type","rego","input"]},"PolicyHealth":{"type":"object","properties":{"total_evaluation_count":{"type":"integer","description":"Total number of evaluations that have occurred","example":1075694761621855595,"format":"int64"},"total_evaluation_entity_count":{"$ref":"#/components/schemas/EvaluationCounts"},"total_policy_count":{"type":"integer","description":"Total number of policies stored","example":1440586742128385263,"format":"int64"},"total_policy_set_count":{"type":"integer","description":"Total number of policy sets stored","example":333280456831607697,"format":"int64"},"total_policy_set_entity_count":{"type":"object","description":"Total number of policy sets by type","example":{"Et aperiam eos laboriosam.":4158539768694987722,"Molestiae quo.":1213808792919247442,"Unde enim molestiae soluta nihil nihil.":3594044833535790815},"additionalProperties":{"type":"integer","example":7529806932165301472,"format":"int64"}}},"description":"Policy health metrics","example":{"total_evaluation_count":4574813677344614924,"total_evaluation_entity_count":{"error":76024433486172609,"pass":4127438089508318555,"warning":511376631733875378},"total_policy_count":2031060111220529933,"total_policy_set_count":1607032054773154549,"total_policy_set_entity_count":{"Autem sit assumenda error.":6741000365707137320,"Optio ipsam et et asperiores libero cupiditate.":9123841955658149183}},"required":["total_policy_count","total_policy_set_count","total_policy_set_entity_count","total_evaluation_count","total_evaluation_entity_count"]},"PolicySample":{"type":"object","properties":{"policy":{"type":"string","description":"Build identifier","example":"policy example"},"status":{"type":"string","description":"status","example":"SUCCESS"}},"example":{"policy":"policy example","status":"SUCCESS"},"required":["status","policy"]},"PolicySet":{"type":"object","properties":{"account_id":{"type":"string","description":"Harness account ID associated with this policy set","default":"","example":"eBqAoNchMLKigC_qZ5EdC"},"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"created":{"type":"integer","description":"Time the policy set was created","example":1636669297674,"format":"int64"},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"entity_selector":{"type":"string","description":"A string enum value which determines which entities the policy set applies to during evaluation","example":"all_entities_in_scope","enum":["all_entities_in_scope","all_entities_in_resource_groups"]},"identifier":{"type":"string","description":"Identifier of the policy set","example":"policyset-1","minLength":1},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies","minLength":1},"org_id":{"type":"string","description":"Harness organization ID associated with this policy set","default":"","example":"test-org"},"policies":{"type":"array","items":{"$ref":"#/components/schemas/LinkedPolicy"},"description":"Policies linked to this policy set","example":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}]},"project_id":{"type":"string","description":"Harness project ID associated with this policy set","default":"","example":"test-project"},"resource_groups":{"type":"array","items":{"$ref":"#/components/schemas/ResourceGroup"},"description":"The groups of resources that this policy set should be applied to","example":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}]},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline","minLength":1},"updated":{"type":"integer","description":"Time the policy set was last updated","example":1636669297674,"format":"int64"}},"example":{"account_id":"eBqAoNchMLKigC_qZ5EdC","action":"onrun","created":1636669297674,"description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_scope","identifier":"policyset-1","name":"Production Policies","org_id":"test-org","policies":[{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674},{"account_id":"eBqAoNchMLKigC_qZ5EdC","created":1636669297674,"identifier":"policy-1","name":"Pipeline Approval","org_id":"test-org","project_id":"test-project","rego":"","severity":"warning","updated":1636669297674}],"project_id":"test-project","resource_groups":[{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."},{"account_id":"Saepe aut soluta ut quia.","created":6663809881773907149,"identifier":"Quia vero a ut nihil.","name":"Veniam quisquam quasi ut sint.","org_id":"Excepturi saepe quos natus.","project_id":"Debitis provident et."}],"type":"pipeline","updated":1636669297674},"required":["identifier","name","action","type","enabled","created","updated","account_id","org_id","project_id","entity_selector"]},"ResourceGroup":{"type":"object","properties":{"account_id":{"type":"string","description":"resource group account id","example":"Reprehenderit nulla."},"created":{"type":"integer","description":"resource group timestamp","example":3389164250940484280,"format":"int64"},"identifier":{"type":"string","description":"resource group identifier","example":"Ullam sunt ea molestiae."},"name":{"type":"string","description":"resource group name","example":"Eaque numquam quia velit nesciunt nobis quas."},"org_id":{"type":"string","description":"resource group org id","example":"Est dolor non dolores tempore et."},"project_id":{"type":"string","description":"resource group project identifier","example":"Nisi ab."}},"example":{"account_id":"Aut modi.","created":3940677915990648385,"identifier":"Qui perferendis autem hic alias unde laudantium.","name":"Aut tempore eveniet rem.","org_id":"Hic incidunt suscipit porro.","project_id":"Sit ex fugiat occaecati animi recusandae."},"required":["account_id","org_id","project_id","identifier","name","created"]},"ResourceGroupIdentifier":{"type":"object","properties":{"account_id":{"type":"string","description":"resource group account id","example":"Ducimus eligendi animi quia cum."},"identifier":{"type":"string","description":"resource group identifier","example":"Laboriosam officiis et tempore corrupti."},"org_id":{"type":"string","description":"resource group org id","example":"Excepturi quis."},"project_id":{"type":"string","description":"resource group project identifier","example":"Et quis eius quidem velit."}},"example":{"account_id":"Voluptatem labore nam quis.","identifier":"Eius qui.","org_id":"Dolorem et fugit nobis minus illum iure.","project_id":"Dolore aut libero quaerat."},"required":["account_id","org_id","project_id","identifier"]},"ServiceVersion":{"type":"object","properties":{"commit":{"type":"string","description":"Build identifier","example":"96381692bf3a2bd7904769c6886e832435768b57"},"version":{"type":"string","description":"Version number","example":"v0.123.0"}},"example":{"commit":"96381692bf3a2bd7904769c6886e832435768b57","version":"v0.123.0"},"required":["version","commit"]},"UpdateRequestBody":{"type":"object","properties":{"name":{"type":"string","description":"The name of the policy","example":"Check that an approval step is present"},"rego":{"type":"string","description":"The rego that defines the policy policy","example":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}},"example":{"name":"Check that an approval step is present","rego":"package test\ndeny[\"should say hello world\"] {input.message != \"world\"}"}},"UpdateRequestBody2":{"type":"object","properties":{"action":{"type":"string","description":"Action that triggers the policy set","example":"onrun","minLength":1},"description":{"type":"string","description":"Description of the policy set","example":"Captures critical production policies"},"enabled":{"type":"boolean","description":"Only enabled policy sets are evaluated when evaluating by type/action","example":true},"entity_selector":{"type":"string","description":"A string enum value which determines which entities the policy set applies to during evaluation. This feature is not available for all accounts, Contact support if you wish to have it enabled.","example":"all_entities_in_scope","enum":["all_entities_in_scope","all_entities_in_resource_groups"]},"name":{"type":"string","description":"Name of the policy set","example":"Production Policies"},"policies":{"type":"array","items":{"$ref":"#/components/schemas/Linkedpolicyidentifier"},"description":"Policies linked to this policy set","example":[{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"}]},"resource_groups":{"type":"array","items":{"$ref":"#/components/schemas/ResourceGroupIdentifier"},"description":"Resource groups that contain the resources that this policy set should be evaluated for. Resource groups are not supported for flag or custom policy sets. This feature is not available for all accounts, Contact support if you wish to have it enabled.","example":[{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."},{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."},{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."},{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."}]},"type":{"type":"string","description":"Type of input suitable for the policy set","example":"pipeline"}},"example":{"action":"onrun","description":"Captures critical production policies","enabled":true,"entity_selector":"all_entities_in_resource_groups","name":"Production Policies","policies":[{"identifier":"policy-1","severity":"warning"},{"identifier":"policy-1","severity":"warning"}],"resource_groups":[{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."},{"account_id":"In repudiandae et quidem possimus ipsum.","identifier":"Numquam rem quia.","org_id":"Possimus praesentium sint veniam eos.","project_id":"Sunt animi ipsa."}],"type":"pipeline"}},"Variable":{"type":"object","properties":{"default":{"type":"array","items":{"type":"string","example":"Molestiae qui ut."},"description":"The values that are selected by default","example":["JiraUpdate","HarnessApproval"]},"desc":{"type":"string","description":"Longer description of the variable to substitute","example":"The required steps that the policy enforces"},"id":{"type":"string","description":"The id of the variable to substitute in the rego","example":"requiredsteps"},"name":{"type":"string","description":"The human readable name of the variable to substitute in the rego","example":"Required Steps"},"type":{"type":"string","description":"The variable type","example":"selectOne","enum":["text","textMultiple","selectOne","selectMultiple"]},"values":{"type":"array","items":{"type":"string","example":"Nihil occaecati cumque et maiores similique aut."},"description":"Pre populated sample values to substitute the variable with","example":["JiraUpdate","HarnessApproval"]}},"example":{"default":["JiraUpdate","HarnessApproval"],"desc":"The required steps that the policy enforces","id":"requiredsteps","name":"Required Steps","type":"selectOne","values":["JiraUpdate","HarnessApproval"]}}},"securitySchemes":{"api_key_header_x-api-key":{"type":"apiKey","description":"Harness PAT","name":"x-api-key","in":"header"},"jwt_header_Authorization":{"type":"http","scheme":"bearer"}}},"tags":[{"name":"aida","description":"AIDA API's for Harness OPA"},{"name":"dashboard","description":"Aggregate summary of policies, policy sets and evaluations for display on the dashboard"},{"name":"examples","description":"Example rego policies and corresponding input"},{"name":"policies","description":"Create, edit and delete Governance policies written in rego"},{"name":"evaluate","description":"Perform evaluations"},{"name":"evaluations","description":"Access evaluation results"},{"name":"policysets","description":"Create, edit and delete Governance policy sets"},{"name":"system","description":"System version and health"}]} \ No newline at end of file