BIGQUERYDATAPOLICY

bigquerydatapolicy.projects.locations.dataPolicies.create

enum_DataMaskingPolicyPredefinedExpression := [ "PREDEFINED_EXPRESSION_UNSPECIFIED", "SHA256", "ALWAYS_NULL", "DEFAULT_MASKING_VALUE", "LAST_FOUR_CHARACTERS", "FIRST_FOUR_CHARACTERS", "EMAIL_MASK", "DATE_YEAR_MASK" ]
enum_DataPolicyDataPolicyType := [ "DATA_POLICY_TYPE_UNSPECIFIED", "COLUMN_LEVEL_SECURITY_POLICY", "DATA_MASKING_POLICY" ]

valid {
    input.Body.dataMaskingPolicy.predefinedExpression == enum_DataMaskingPolicyPredefinedExpression[_]
    input.Body.dataMaskingPolicy.routine == STRING
    input.Body.dataPolicyId == STRING
    input.Body.dataPolicyType == enum_DataPolicyDataPolicyType[_]
    input.Body.policyTag == STRING
    input.ReqMap.parent == STRING
    input.ProviderMetadata.Region == STRING
}

bigquerydatapolicy.projects.locations.dataPolicies.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

bigquerydatapolicy.projects.locations.dataPolicies.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

bigquerydatapolicy.projects.locations.dataPolicies.getIamPolicy

valid {
    input.Body.options.requestedPolicyVersion == INTEGER
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

bigquerydatapolicy.projects.locations.dataPolicies.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

bigquerydatapolicy.projects.locations.dataPolicies.patch

enum_DataMaskingPolicyPredefinedExpression := [ "PREDEFINED_EXPRESSION_UNSPECIFIED", "SHA256", "ALWAYS_NULL", "DEFAULT_MASKING_VALUE", "LAST_FOUR_CHARACTERS", "FIRST_FOUR_CHARACTERS", "EMAIL_MASK", "DATE_YEAR_MASK" ]
enum_DataPolicyDataPolicyType := [ "DATA_POLICY_TYPE_UNSPECIFIED", "COLUMN_LEVEL_SECURITY_POLICY", "DATA_MASKING_POLICY" ]

valid {
    input.Body.dataMaskingPolicy.predefinedExpression == enum_DataMaskingPolicyPredefinedExpression[_]
    input.Body.dataMaskingPolicy.routine == STRING
    input.Body.dataPolicyId == STRING
    input.Body.dataPolicyType == enum_DataPolicyDataPolicyType[_]
    input.Body.policyTag == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

bigquerydatapolicy.projects.locations.dataPolicies.rename

valid {
    input.Body.newDataPolicyId == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

bigquerydatapolicy.projects.locations.dataPolicies.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

bigquerydatapolicy.projects.locations.dataPolicies.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}