EVENTARC
eventarc.projects.locations.channelConnections.create
valid {
input.Body.activationToken == STRING
input.Body.channel == STRING
input.Body.name == STRING
input.ReqMap.parent == STRING
input.Qs.channelConnectionId == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channelConnections.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.create
valid {
input.Body.cryptoKeyName == STRING
input.Body.name == STRING
input.Body.provider == STRING
input.ReqMap.parent == STRING
input.Qs.channelId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.delete
valid {
input.ReqMap.name == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.list
valid {
input.ReqMap.parent == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.patch
valid {
input.Body.cryptoKeyName == STRING
input.Body.name == STRING
input.Body.provider == STRING
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.channels.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.enrollments.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.getGoogleChannelConfig
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.googleApiSources.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.messageBuses.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.operations.cancel
valid {
input.Body.STRING == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.operations.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.pipelines.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.providers.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.providers.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.create
valid {
input.Body.channel == STRING
input.Body.destination.cloudFunction == STRING
input.Body.destination.cloudRun.path == STRING
input.Body.destination.cloudRun.region == STRING
input.Body.destination.cloudRun.service == STRING
input.Body.destination.gke.cluster == STRING
input.Body.destination.gke.location == STRING
input.Body.destination.gke.namespace == STRING
input.Body.destination.gke.path == STRING
input.Body.destination.gke.service == STRING
input.Body.destination.httpEndpoint.uri == STRING
input.Body.destination.networkConfig.networkAttachment == STRING
input.Body.destination.workflow == STRING
input.Body.eventDataContentType == STRING
input.Body.eventFilters[_].attribute == STRING
input.Body.eventFilters[_].operator == STRING
input.Body.eventFilters[_].value == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.serviceAccount == STRING
input.Body.transport.pubsub.topic == STRING
input.ReqMap.parent == STRING
input.Qs.triggerId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.delete
valid {
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.etag == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.patch
valid {
input.Body.channel == STRING
input.Body.destination.cloudFunction == STRING
input.Body.destination.cloudRun.path == STRING
input.Body.destination.cloudRun.region == STRING
input.Body.destination.cloudRun.service == STRING
input.Body.destination.gke.cluster == STRING
input.Body.destination.gke.location == STRING
input.Body.destination.gke.namespace == STRING
input.Body.destination.gke.path == STRING
input.Body.destination.gke.service == STRING
input.Body.destination.httpEndpoint.uri == STRING
input.Body.destination.networkConfig.networkAttachment == STRING
input.Body.destination.workflow == STRING
input.Body.eventDataContentType == STRING
input.Body.eventFilters[_].attribute == STRING
input.Body.eventFilters[_].operator == STRING
input.Body.eventFilters[_].value == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.serviceAccount == STRING
input.Body.transport.pubsub.topic == STRING
input.ReqMap.name == STRING
input.Qs.allowMissing == BOOLEAN
input.Qs.updateMask == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.triggers.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
eventarc.projects.locations.updateGoogleChannelConfig
valid {
input.Body.cryptoKeyName == STRING
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
Updated 20 days ago