eventarc.projects.locations.channelConnections.create

valid {
    input.Body.activationToken == STRING
    input.Body.channel == STRING
    input.Body.name == STRING
    input.ReqMap.parent == STRING
    input.Qs.channelConnectionId == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channelConnections.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channelConnections.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channelConnections.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channelConnections.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channelConnections.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channelConnections.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channels.create

valid {
    input.Body.cryptoKeyName == STRING
    input.Body.name == STRING
    input.Body.provider == STRING
    input.ReqMap.parent == STRING
    input.Qs.channelId == STRING
    input.Qs.validateOnly == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channels.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.validateOnly == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channels.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channels.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channels.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channels.patch

valid {
    input.Body.cryptoKeyName == STRING
    input.Body.name == STRING
    input.Body.provider == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.Qs.validateOnly == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channels.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.channels.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.getGoogleChannelConfig

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.operations.cancel

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.operations.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.providers.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.providers.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.triggers.create

valid {
    input.Body.channel == STRING
    input.Body.destination.cloudFunction == STRING
    input.Body.destination.cloudRun.path == STRING
    input.Body.destination.cloudRun.region == STRING
    input.Body.destination.cloudRun.service == STRING
    input.Body.destination.gke.cluster == STRING
    input.Body.destination.gke.location == STRING
    input.Body.destination.gke.namespace == STRING
    input.Body.destination.gke.path == STRING
    input.Body.destination.gke.service == STRING
    input.Body.destination.httpEndpoint.uri == STRING
    input.Body.destination.networkConfig.networkAttachment == STRING
    input.Body.destination.workflow == STRING
    input.Body.eventDataContentType == STRING
    input.Body.eventFilters[_].attribute == STRING
    input.Body.eventFilters[_].operator == STRING
    input.Body.eventFilters[_].value == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.serviceAccount == STRING
    input.Body.transport.pubsub.topic == STRING
    input.ReqMap.parent == STRING
    input.Qs.triggerId == STRING
    input.Qs.validateOnly == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.triggers.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.allowMissing == BOOLEAN
    input.Qs.etag == STRING
    input.Qs.validateOnly == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.triggers.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.triggers.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.triggers.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.triggers.patch

valid {
    input.Body.channel == STRING
    input.Body.destination.cloudFunction == STRING
    input.Body.destination.cloudRun.path == STRING
    input.Body.destination.cloudRun.region == STRING
    input.Body.destination.cloudRun.service == STRING
    input.Body.destination.gke.cluster == STRING
    input.Body.destination.gke.location == STRING
    input.Body.destination.gke.namespace == STRING
    input.Body.destination.gke.path == STRING
    input.Body.destination.gke.service == STRING
    input.Body.destination.httpEndpoint.uri == STRING
    input.Body.destination.networkConfig.networkAttachment == STRING
    input.Body.destination.workflow == STRING
    input.Body.eventDataContentType == STRING
    input.Body.eventFilters[_].attribute == STRING
    input.Body.eventFilters[_].operator == STRING
    input.Body.eventFilters[_].value == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.serviceAccount == STRING
    input.Body.transport.pubsub.topic == STRING
    input.ReqMap.name == STRING
    input.Qs.allowMissing == BOOLEAN
    input.Qs.updateMask == STRING
    input.Qs.validateOnly == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.triggers.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.triggers.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

eventarc.projects.locations.updateGoogleChannelConfig

valid {
    input.Body.cryptoKeyName == STRING
    input.Body.name == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}