DATAFUSION

datafusion.projects.locations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.create

enum_InstanceType := [ "TYPE_UNSPECIFIED", "BASIC", "ENTERPRISE", "DEVELOPER" ]
enum_NetworkConfigConnectionType := [ "CONNECTION_TYPE_UNSPECIFIED", "VPC_PEERING", "PRIVATE_SERVICE_CONNECT_INTERFACES" ]

valid {
    input.Body.cryptoKeyConfig.keyReference == STRING
    input.Body.dataplexDataLineageIntegrationEnabled == BOOLEAN
    input.Body.dataprocServiceAccount == STRING
    input.Body.description == STRING
    input.Body.displayName == STRING
    input.Body.enableRbac == BOOLEAN
    input.Body.enableStackdriverLogging == BOOLEAN
    input.Body.enableStackdriverMonitoring == BOOLEAN
    input.Body.eventPublishConfig.enabled == BOOLEAN
    input.Body.eventPublishConfig.topic == STRING
    input.Body.labels.STRING == STRING
    input.Body.maintenancePolicy.maintenanceExclusionWindow.endTime == STRING
    input.Body.maintenancePolicy.maintenanceExclusionWindow.startTime == STRING
    input.Body.maintenancePolicy.maintenanceWindow.recurringTimeWindow.recurrence == STRING
    input.Body.maintenancePolicy.maintenanceWindow.recurringTimeWindow.window.endTime == STRING
    input.Body.maintenancePolicy.maintenanceWindow.recurringTimeWindow.window.startTime == STRING
    input.Body.networkConfig.connectionType == enum_NetworkConfigConnectionType[_]
    input.Body.networkConfig.ipAllocation == STRING
    input.Body.networkConfig.network == STRING
    input.Body.networkConfig.privateServiceConnectConfig.networkAttachment == STRING
    input.Body.networkConfig.privateServiceConnectConfig.unreachableCidrBlock == STRING
    input.Body.options.STRING == STRING
    input.Body.patchRevision == STRING
    input.Body.privateInstance == BOOLEAN
    input.Body.type == enum_InstanceType[_]
    input.Body.version == STRING
    input.Body.zone == STRING
    input.ReqMap.parent == STRING
    input.Qs.instanceId == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.dnsPeerings.create

valid {
    input.Body.description == STRING
    input.Body.domain == STRING
    input.Body.name == STRING
    input.Body.targetNetwork == STRING
    input.Body.targetProject == STRING
    input.ReqMap.parent == STRING
    input.Qs.dnsPeeringId == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.dnsPeerings.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.dnsPeerings.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.namespaces.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.namespaces.list

enum_ViewParameter := [ "NAMESPACE_VIEW_UNSPECIFIED", "NAMESPACE_VIEW_BASIC", "NAMESPACE_VIEW_FULL" ]

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.Qs.view == enum_ViewParameter[_]
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.namespaces.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.namespaces.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.patch

enum_InstanceType := [ "TYPE_UNSPECIFIED", "BASIC", "ENTERPRISE", "DEVELOPER" ]
enum_NetworkConfigConnectionType := [ "CONNECTION_TYPE_UNSPECIFIED", "VPC_PEERING", "PRIVATE_SERVICE_CONNECT_INTERFACES" ]

valid {
    input.Body.cryptoKeyConfig.keyReference == STRING
    input.Body.dataplexDataLineageIntegrationEnabled == BOOLEAN
    input.Body.dataprocServiceAccount == STRING
    input.Body.description == STRING
    input.Body.displayName == STRING
    input.Body.enableRbac == BOOLEAN
    input.Body.enableStackdriverLogging == BOOLEAN
    input.Body.enableStackdriverMonitoring == BOOLEAN
    input.Body.eventPublishConfig.enabled == BOOLEAN
    input.Body.eventPublishConfig.topic == STRING
    input.Body.labels.STRING == STRING
    input.Body.maintenancePolicy.maintenanceExclusionWindow.endTime == STRING
    input.Body.maintenancePolicy.maintenanceExclusionWindow.startTime == STRING
    input.Body.maintenancePolicy.maintenanceWindow.recurringTimeWindow.recurrence == STRING
    input.Body.maintenancePolicy.maintenanceWindow.recurringTimeWindow.window.endTime == STRING
    input.Body.maintenancePolicy.maintenanceWindow.recurringTimeWindow.window.startTime == STRING
    input.Body.networkConfig.connectionType == enum_NetworkConfigConnectionType[_]
    input.Body.networkConfig.ipAllocation == STRING
    input.Body.networkConfig.network == STRING
    input.Body.networkConfig.privateServiceConnectConfig.networkAttachment == STRING
    input.Body.networkConfig.privateServiceConnectConfig.unreachableCidrBlock == STRING
    input.Body.options.STRING == STRING
    input.Body.patchRevision == STRING
    input.Body.privateInstance == BOOLEAN
    input.Body.type == enum_InstanceType[_]
    input.Body.version == STRING
    input.Body.zone == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.restart

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.instances.upgrade

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.operations.cancel

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.operations.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.removeIamPolicy

valid {
    input.Body.STRING == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

datafusion.projects.locations.versions.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.latestPatchOnly == BOOLEAN
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}