EVENTARC
eventarc.projects.locations.channelConnections.create
valid {
input.Body.activationToken == STRING
input.Body.channel == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.ReqMap.parent == STRING
input.Qs.channelConnectionId == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.create
valid {
input.Body.cryptoKeyName == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.provider == STRING
input.ReqMap.parent == STRING
input.Qs.channelId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.delete
valid {
input.ReqMap.name == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.list
valid {
input.ReqMap.parent == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.patch
valid {
input.Body.cryptoKeyName == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.provider == STRING
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.create
valid {
input.Body.annotations.STRING == STRING
input.Body.celMatch == STRING
input.Body.destination == STRING
input.Body.displayName == STRING
input.Body.labels.STRING == STRING
input.Body.messageBus == STRING
input.Body.name == STRING
input.ReqMap.parent == STRING
input.Qs.enrollmentId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.delete
valid {
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.etag == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.patch
valid {
input.Body.annotations.STRING == STRING
input.Body.celMatch == STRING
input.Body.destination == STRING
input.Body.displayName == STRING
input.Body.labels.STRING == STRING
input.Body.messageBus == STRING
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.updateMask == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.getGoogleChannelConfig
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.create
enum_LoggingConfigLogSeverity := [ "LOG_SEVERITY_UNSPECIFIED", "NONE", "DEBUG", "INFO", "NOTICE", "WARNING", "ERROR", "CRITICAL", "ALERT", "EMERGENCY" ]
valid {
input.Body.annotations.STRING == STRING
input.Body.cryptoKeyName == STRING
input.Body.destination == STRING
input.Body.displayName == STRING
input.Body.labels.STRING == STRING
input.Body.loggingConfig.logSeverity == enum_LoggingConfigLogSeverity[_]
input.Body.name == STRING
input.ReqMap.parent == STRING
input.Qs.googleApiSourceId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.delete
valid {
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.etag == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.patch
enum_LoggingConfigLogSeverity := [ "LOG_SEVERITY_UNSPECIFIED", "NONE", "DEBUG", "INFO", "NOTICE", "WARNING", "ERROR", "CRITICAL", "ALERT", "EMERGENCY" ]
valid {
input.Body.annotations.STRING == STRING
input.Body.cryptoKeyName == STRING
input.Body.destination == STRING
input.Body.displayName == STRING
input.Body.labels.STRING == STRING
input.Body.loggingConfig.logSeverity == enum_LoggingConfigLogSeverity[_]
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.updateMask == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.create
enum_LoggingConfigLogSeverity := [ "LOG_SEVERITY_UNSPECIFIED", "NONE", "DEBUG", "INFO", "NOTICE", "WARNING", "ERROR", "CRITICAL", "ALERT", "EMERGENCY" ]
valid {
input.Body.annotations.STRING == STRING
input.Body.cryptoKeyName == STRING
input.Body.displayName == STRING
input.Body.labels.STRING == STRING
input.Body.loggingConfig.logSeverity == enum_LoggingConfigLogSeverity[_]
input.Body.name == STRING
input.ReqMap.parent == STRING
input.Qs.messageBusId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.delete
valid {
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.etag == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.listEnrollments
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.patch
enum_LoggingConfigLogSeverity := [ "LOG_SEVERITY_UNSPECIFIED", "NONE", "DEBUG", "INFO", "NOTICE", "WARNING", "ERROR", "CRITICAL", "ALERT", "EMERGENCY" ]
valid {
input.Body.annotations.STRING == STRING
input.Body.cryptoKeyName == STRING
input.Body.displayName == STRING
input.Body.labels.STRING == STRING
input.Body.loggingConfig.logSeverity == enum_LoggingConfigLogSeverity[_]
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.updateMask == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.operations.cancel
valid {
input.Body.STRING == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.operations.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.create
enum_LoggingConfigLogSeverity := [ "LOG_SEVERITY_UNSPECIFIED", "NONE", "DEBUG", "INFO", "NOTICE", "WARNING", "ERROR", "CRITICAL", "ALERT", "EMERGENCY" ]
valid {
input.Body.annotations.STRING == STRING
input.Body.cryptoKeyName == STRING
input.Body.destinations[_].authenticationConfig.googleOidc.audience == STRING
input.Body.destinations[_].authenticationConfig.googleOidc.serviceAccount == STRING
input.Body.destinations[_].authenticationConfig.oauthToken.scope == STRING
input.Body.destinations[_].authenticationConfig.oauthToken.serviceAccount == STRING
input.Body.destinations[_].httpEndpoint.messageBindingTemplate == STRING
input.Body.destinations[_].httpEndpoint.uri == STRING
input.Body.destinations[_].messageBus == STRING
input.Body.destinations[_].networkConfig.networkAttachment == STRING
input.Body.destinations[_].outputPayloadFormat.avro.schemaDefinition == STRING
input.Body.destinations[_].outputPayloadFormat.json.STRING == STRING
input.Body.destinations[_].outputPayloadFormat.protobuf.schemaDefinition == STRING
input.Body.destinations[_].topic == STRING
input.Body.destinations[_].workflow == STRING
input.Body.displayName == STRING
input.Body.etag == STRING
input.Body.inputPayloadFormat.avro.schemaDefinition == STRING
input.Body.inputPayloadFormat.json.STRING == STRING
input.Body.inputPayloadFormat.protobuf.schemaDefinition == STRING
input.Body.labels.STRING == STRING
input.Body.loggingConfig.logSeverity == enum_LoggingConfigLogSeverity[_]
input.Body.mediations[_].transformation.transformationTemplate == STRING
input.Body.name == STRING
input.Body.retryPolicy.maxAttempts == INTEGER
input.Body.retryPolicy.maxRetryDelay == STRING
input.Body.retryPolicy.minRetryDelay == STRING
input.ReqMap.parent == STRING
input.Qs.pipelineId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.delete
valid {
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.etag == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.patch
enum_LoggingConfigLogSeverity := [ "LOG_SEVERITY_UNSPECIFIED", "NONE", "DEBUG", "INFO", "NOTICE", "WARNING", "ERROR", "CRITICAL", "ALERT", "EMERGENCY" ]
valid {
input.Body.annotations.STRING == STRING
input.Body.cryptoKeyName == STRING
input.Body.destinations[_].authenticationConfig.googleOidc.audience == STRING
input.Body.destinations[_].authenticationConfig.googleOidc.serviceAccount == STRING
input.Body.destinations[_].authenticationConfig.oauthToken.scope == STRING
input.Body.destinations[_].authenticationConfig.oauthToken.serviceAccount == STRING
input.Body.destinations[_].httpEndpoint.messageBindingTemplate == STRING
input.Body.destinations[_].httpEndpoint.uri == STRING
input.Body.destinations[_].messageBus == STRING
input.Body.destinations[_].networkConfig.networkAttachment == STRING
input.Body.destinations[_].outputPayloadFormat.avro.schemaDefinition == STRING
input.Body.destinations[_].outputPayloadFormat.json.STRING == STRING
input.Body.destinations[_].outputPayloadFormat.protobuf.schemaDefinition == STRING
input.Body.destinations[_].topic == STRING
input.Body.destinations[_].workflow == STRING
input.Body.displayName == STRING
input.Body.etag == STRING
input.Body.inputPayloadFormat.avro.schemaDefinition == STRING
input.Body.inputPayloadFormat.json.STRING == STRING
input.Body.inputPayloadFormat.protobuf.schemaDefinition == STRING
input.Body.labels.STRING == STRING
input.Body.loggingConfig.logSeverity == enum_LoggingConfigLogSeverity[_]
input.Body.mediations[_].transformation.transformationTemplate == STRING
input.Body.name == STRING
input.Body.retryPolicy.maxAttempts == INTEGER
input.Body.retryPolicy.maxRetryDelay == STRING
input.Body.retryPolicy.minRetryDelay == STRING
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.updateMask == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.providers.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.providers.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.create
valid {
input.Body.channel == STRING
input.Body.destination.cloudFunction == STRING
input.Body.destination.cloudRun.path == STRING
input.Body.destination.cloudRun.region == STRING
input.Body.destination.cloudRun.service == STRING
input.Body.destination.gke.cluster == STRING
input.Body.destination.gke.location == STRING
input.Body.destination.gke.namespace == STRING
input.Body.destination.gke.path == STRING
input.Body.destination.gke.service == STRING
input.Body.destination.httpEndpoint.uri == STRING
input.Body.destination.networkConfig.networkAttachment == STRING
input.Body.destination.workflow == STRING
input.Body.eventDataContentType == STRING
input.Body.eventFilters[_].attribute == STRING
input.Body.eventFilters[_].operator == STRING
input.Body.eventFilters[_].value == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.serviceAccount == STRING
input.Body.transport.pubsub.topic == STRING
input.ReqMap.parent == STRING
input.Qs.triggerId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.delete
valid {
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.etag == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.patch
valid {
input.Body.channel == STRING
input.Body.destination.cloudFunction == STRING
input.Body.destination.cloudRun.path == STRING
input.Body.destination.cloudRun.region == STRING
input.Body.destination.cloudRun.service == STRING
input.Body.destination.gke.cluster == STRING
input.Body.destination.gke.location == STRING
input.Body.destination.gke.namespace == STRING
input.Body.destination.gke.path == STRING
input.Body.destination.gke.service == STRING
input.Body.destination.httpEndpoint.uri == STRING
input.Body.destination.networkConfig.networkAttachment == STRING
input.Body.destination.workflow == STRING
input.Body.eventDataContentType == STRING
input.Body.eventFilters[_].attribute == STRING
input.Body.eventFilters[_].operator == STRING
input.Body.eventFilters[_].value == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.serviceAccount == STRING
input.Body.transport.pubsub.topic == STRING
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.updateMask == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.updateGoogleChannelConfig
valid {
input.Body.cryptoKeyName == STRING
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
Updated 4 days ago