BACKUPDR
backupdr.projects.locations.backupVaults.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.managementServers.create
enum_ManagementServerType := [ "INSTANCE_TYPE_UNSPECIFIED", "BACKUP_RESTORE" ]
enum_NetworkConfigPeeringMode := [ "PEERING_MODE_UNSPECIFIED", "PRIVATE_SERVICE_ACCESS" ]
valid {
input.Body.description == STRING
input.Body.etag == STRING
input.Body.labels.STRING == STRING
input.Body.networks[_].network == STRING
input.Body.networks[_].peeringMode == enum_NetworkConfigPeeringMode[_]
input.Body.type == enum_ManagementServerType[_]
input.ReqMap.parent == STRING
input.Qs.managementServerId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.managementServers.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.managementServers.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.managementServers.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.managementServers.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.managementServers.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.managementServers.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.operations.cancel
valid {
input.Body.STRING == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.operations.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
backupdr.projects.locations.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
Updated 7 days ago