BIGQUERYDATAPOLICY
bigquerydatapolicy.projects.locations.dataPolicies.create
enum_DataMaskingPolicyPredefinedExpression := [ "PREDEFINED_EXPRESSION_UNSPECIFIED", "SHA256", "ALWAYS_NULL", "DEFAULT_MASKING_VALUE", "LAST_FOUR_CHARACTERS", "FIRST_FOUR_CHARACTERS", "EMAIL_MASK", "DATE_YEAR_MASK" ]
enum_DataPolicyDataPolicyType := [ "DATA_POLICY_TYPE_UNSPECIFIED", "COLUMN_LEVEL_SECURITY_POLICY", "DATA_MASKING_POLICY" ]
valid {
input.Body.dataMaskingPolicy.predefinedExpression == enum_DataMaskingPolicyPredefinedExpression[_]
input.Body.dataMaskingPolicy.routine == STRING
input.Body.dataPolicyId == STRING
input.Body.dataPolicyType == enum_DataPolicyDataPolicyType[_]
input.Body.policyTag == STRING
input.ReqMap.parent == STRING
input.ProviderMetadata.Region == STRING
}
bigquerydatapolicy.projects.locations.dataPolicies.delete
valid {
input.ReqMap.name == STRING
input.Qs.force == BOOLEAN
input.ProviderMetadata.Region == STRING
}
bigquerydatapolicy.projects.locations.dataPolicies.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
bigquerydatapolicy.projects.locations.dataPolicies.getIamPolicy
valid {
input.Body.options.requestedPolicyVersion == INTEGER
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
bigquerydatapolicy.projects.locations.dataPolicies.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
bigquerydatapolicy.projects.locations.dataPolicies.patch
enum_DataMaskingPolicyPredefinedExpression := [ "PREDEFINED_EXPRESSION_UNSPECIFIED", "SHA256", "ALWAYS_NULL", "DEFAULT_MASKING_VALUE", "LAST_FOUR_CHARACTERS", "FIRST_FOUR_CHARACTERS", "EMAIL_MASK", "DATE_YEAR_MASK" ]
enum_DataPolicyDataPolicyType := [ "DATA_POLICY_TYPE_UNSPECIFIED", "COLUMN_LEVEL_SECURITY_POLICY", "DATA_MASKING_POLICY" ]
valid {
input.Body.dataMaskingPolicy.predefinedExpression == enum_DataMaskingPolicyPredefinedExpression[_]
input.Body.dataMaskingPolicy.routine == STRING
input.Body.dataPolicyId == STRING
input.Body.dataPolicyType == enum_DataPolicyDataPolicyType[_]
input.Body.policyTag == STRING
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
bigquerydatapolicy.projects.locations.dataPolicies.rename
valid {
input.Body.newDataPolicyId == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
bigquerydatapolicy.projects.locations.dataPolicies.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
bigquerydatapolicy.projects.locations.dataPolicies.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
Updated about 2 months ago