CERTIFICATEMANAGER

certificatemanager.projects.locations.certificateIssuanceConfigs.create

enum_CertificateIssuanceConfigKeyAlgorithm := [ "KEY_ALGORITHM_UNSPECIFIED", "RSA_2048", "ECDSA_P256" ]

valid {
    input.Body.certificateAuthorityConfig.certificateAuthorityServiceConfig.caPool == STRING
    input.Body.description == STRING
    input.Body.keyAlgorithm == enum_CertificateIssuanceConfigKeyAlgorithm[_]
    input.Body.labels.STRING == STRING
    input.Body.lifetime == STRING
    input.Body.name == STRING
    input.Body.rotationWindowPercentage == INTEGER
    input.ReqMap.parent == STRING
    input.Qs.certificateIssuanceConfigId == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateIssuanceConfigs.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateIssuanceConfigs.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateIssuanceConfigs.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.certificateMapEntries.create

enum_CertificateMapEntryMatcher := [ "MATCHER_UNSPECIFIED", "PRIMARY" ]

valid {
    input.Body.certificates[_] == STRING
    input.Body.description == STRING
    input.Body.hostname == STRING
    input.Body.labels.STRING == STRING
    input.Body.matcher == enum_CertificateMapEntryMatcher[_]
    input.Body.name == STRING
    input.ReqMap.parent == STRING
    input.Qs.certificateMapEntryId == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.certificateMapEntries.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.certificateMapEntries.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.certificateMapEntries.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.certificateMapEntries.patch

enum_CertificateMapEntryMatcher := [ "MATCHER_UNSPECIFIED", "PRIMARY" ]

valid {
    input.Body.certificates[_] == STRING
    input.Body.description == STRING
    input.Body.hostname == STRING
    input.Body.labels.STRING == STRING
    input.Body.matcher == enum_CertificateMapEntryMatcher[_]
    input.Body.name == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.create

valid {
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.ReqMap.parent == STRING
    input.Qs.certificateMapId == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificateMaps.patch

valid {
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificates.create

enum_CertificateScope := [ "DEFAULT", "EDGE_CACHE", "ALL_REGIONS" ]

valid {
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.managed.dnsAuthorizations[_] == STRING
    input.Body.managed.domains[_] == STRING
    input.Body.managed.issuanceConfig == STRING
    input.Body.name == STRING
    input.Body.scope == enum_CertificateScope[_]
    input.Body.selfManaged.pemCertificate == STRING
    input.Body.selfManaged.pemPrivateKey == STRING
    input.ReqMap.parent == STRING
    input.Qs.certificateId == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificates.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificates.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificates.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.certificates.patch

enum_CertificateScope := [ "DEFAULT", "EDGE_CACHE", "ALL_REGIONS" ]

valid {
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.managed.dnsAuthorizations[_] == STRING
    input.Body.managed.domains[_] == STRING
    input.Body.managed.issuanceConfig == STRING
    input.Body.name == STRING
    input.Body.scope == enum_CertificateScope[_]
    input.Body.selfManaged.pemCertificate == STRING
    input.Body.selfManaged.pemPrivateKey == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.dnsAuthorizations.create

enum_DnsAuthorizationType := [ "TYPE_UNSPECIFIED", "FIXED_RECORD", "PER_PROJECT_RECORD" ]

valid {
    input.Body.description == STRING
    input.Body.domain == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.type == enum_DnsAuthorizationType[_]
    input.ReqMap.parent == STRING
    input.Qs.dnsAuthorizationId == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.dnsAuthorizations.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.dnsAuthorizations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.dnsAuthorizations.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.dnsAuthorizations.patch

enum_DnsAuthorizationType := [ "TYPE_UNSPECIFIED", "FIXED_RECORD", "PER_PROJECT_RECORD" ]

valid {
    input.Body.description == STRING
    input.Body.domain == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.type == enum_DnsAuthorizationType[_]
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.operations.cancel

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.operations.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.trustConfigs.create

valid {
    input.Body.allowlistedCertificates[_].pemCertificate == STRING
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.trustStores[_].intermediateCas[_].pemCertificate == STRING
    input.Body.trustStores[_].trustAnchors[_].pemCertificate == STRING
    input.ReqMap.parent == STRING
    input.Qs.trustConfigId == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.trustConfigs.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.trustConfigs.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.trustConfigs.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

certificatemanager.projects.locations.trustConfigs.patch

valid {
    input.Body.allowlistedCertificates[_].pemCertificate == STRING
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.trustStores[_].intermediateCas[_].pemCertificate == STRING
    input.Body.trustStores[_].trustAnchors[_].pemCertificate == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}