gkebackup.projects.locations.backupPlans.backups.create

valid {
    input.Body.deleteLockDays == INTEGER
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.retainDays == INTEGER
    input.ReqMap.parent == STRING
    input.Qs.backupId == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.Qs.force == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.getBackupIndexDownloadUrl

valid {
    input.ReqMap.backup == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.patch

valid {
    input.Body.deleteLockDays == INTEGER
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.retainDays == INTEGER
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.volumeBackups.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.volumeBackups.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.volumeBackups.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.volumeBackups.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.backups.volumeBackups.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.create

enum_DayOfWeekListDaysOfWeek := [ "DAY_OF_WEEK_UNSPECIFIED", "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" ]

valid {
    input.Body.backupConfig.allNamespaces == BOOLEAN
    input.Body.backupConfig.encryptionKey.gcpKmsEncryptionKey == STRING
    input.Body.backupConfig.includeSecrets == BOOLEAN
    input.Body.backupConfig.includeVolumeData == BOOLEAN
    input.Body.backupConfig.permissiveMode == BOOLEAN
    input.Body.backupConfig.selectedApplications.namespacedNames[_].name == STRING
    input.Body.backupConfig.selectedApplications.namespacedNames[_].namespace == STRING
    input.Body.backupConfig.selectedNamespaces.namespaces[_] == STRING
    input.Body.backupSchedule.cronSchedule == STRING
    input.Body.backupSchedule.paused == BOOLEAN
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].daily == BOOLEAN
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].daysOfWeek.daysOfWeek[_] == enum_DayOfWeekListDaysOfWeek[_]
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].duration == STRING
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].singleOccurrenceDate.day == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].singleOccurrenceDate.month == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].singleOccurrenceDate.year == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].startTime.hours == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].startTime.minutes == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].startTime.nanos == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].startTime.seconds == INTEGER
    input.Body.backupSchedule.rpoConfig.targetRpoMinutes == INTEGER
    input.Body.cluster == STRING
    input.Body.deactivated == BOOLEAN
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.retentionPolicy.backupDeleteLockDays == INTEGER
    input.Body.retentionPolicy.backupRetainDays == INTEGER
    input.Body.retentionPolicy.locked == BOOLEAN
    input.ReqMap.parent == STRING
    input.Qs.backupPlanId == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.patch

enum_DayOfWeekListDaysOfWeek := [ "DAY_OF_WEEK_UNSPECIFIED", "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" ]

valid {
    input.Body.backupConfig.allNamespaces == BOOLEAN
    input.Body.backupConfig.encryptionKey.gcpKmsEncryptionKey == STRING
    input.Body.backupConfig.includeSecrets == BOOLEAN
    input.Body.backupConfig.includeVolumeData == BOOLEAN
    input.Body.backupConfig.permissiveMode == BOOLEAN
    input.Body.backupConfig.selectedApplications.namespacedNames[_].name == STRING
    input.Body.backupConfig.selectedApplications.namespacedNames[_].namespace == STRING
    input.Body.backupConfig.selectedNamespaces.namespaces[_] == STRING
    input.Body.backupSchedule.cronSchedule == STRING
    input.Body.backupSchedule.paused == BOOLEAN
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].daily == BOOLEAN
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].daysOfWeek.daysOfWeek[_] == enum_DayOfWeekListDaysOfWeek[_]
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].duration == STRING
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].singleOccurrenceDate.day == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].singleOccurrenceDate.month == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].singleOccurrenceDate.year == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].startTime.hours == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].startTime.minutes == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].startTime.nanos == INTEGER
    input.Body.backupSchedule.rpoConfig.exclusionWindows[_].startTime.seconds == INTEGER
    input.Body.backupSchedule.rpoConfig.targetRpoMinutes == INTEGER
    input.Body.cluster == STRING
    input.Body.deactivated == BOOLEAN
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.retentionPolicy.backupDeleteLockDays == INTEGER
    input.Body.retentionPolicy.backupRetainDays == INTEGER
    input.Body.retentionPolicy.locked == BOOLEAN
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.backupPlans.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.operations.cancel

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.operations.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.create

enum_RestoreConfigClusterResourceConflictPolicy := [ "CLUSTER_RESOURCE_CONFLICT_POLICY_UNSPECIFIED", "USE_EXISTING_VERSION", "USE_BACKUP_VERSION" ]
enum_RestoreConfigNamespacedResourceRestoreMode := [ "NAMESPACED_RESOURCE_RESTORE_MODE_UNSPECIFIED", "DELETE_AND_RESTORE", "FAIL_ON_CONFLICT", "MERGE_SKIP_ON_CONFLICT", "MERGE_REPLACE_VOLUME_ON_CONFLICT", "MERGE_REPLACE_ON_CONFLICT" ]
enum_RestoreConfigVolumeDataRestorePolicy := [ "VOLUME_DATA_RESTORE_POLICY_UNSPECIFIED", "RESTORE_VOLUME_DATA_FROM_BACKUP", "REUSE_VOLUME_HANDLE_FROM_BACKUP", "NO_VOLUME_DATA_RESTORATION" ]
enum_TransformationRuleActionOp := [ "OP_UNSPECIFIED", "REMOVE", "MOVE", "COPY", "ADD", "TEST", "REPLACE" ]
enum_VolumeDataRestorePolicyBindingPolicy := [ "VOLUME_DATA_RESTORE_POLICY_UNSPECIFIED", "RESTORE_VOLUME_DATA_FROM_BACKUP", "REUSE_VOLUME_HANDLE_FROM_BACKUP", "NO_VOLUME_DATA_RESTORATION" ]
enum_VolumeDataRestorePolicyBindingVolumeType := [ "VOLUME_TYPE_UNSPECIFIED", "GCE_PERSISTENT_DISK" ]

valid {
    input.Body.backupPlan == STRING
    input.Body.cluster == STRING
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.restoreConfig.allNamespaces == BOOLEAN
    input.Body.restoreConfig.clusterResourceConflictPolicy == enum_RestoreConfigClusterResourceConflictPolicy[_]
    input.Body.restoreConfig.clusterResourceRestoreScope.allGroupKinds == BOOLEAN
    input.Body.restoreConfig.clusterResourceRestoreScope.excludedGroupKinds[_].resourceGroup == STRING
    input.Body.restoreConfig.clusterResourceRestoreScope.excludedGroupKinds[_].resourceKind == STRING
    input.Body.restoreConfig.clusterResourceRestoreScope.noGroupKinds == BOOLEAN
    input.Body.restoreConfig.clusterResourceRestoreScope.selectedGroupKinds[_].resourceGroup == STRING
    input.Body.restoreConfig.clusterResourceRestoreScope.selectedGroupKinds[_].resourceKind == STRING
    input.Body.restoreConfig.excludedNamespaces.namespaces[_] == STRING
    input.Body.restoreConfig.namespacedResourceRestoreMode == enum_RestoreConfigNamespacedResourceRestoreMode[_]
    input.Body.restoreConfig.noNamespaces == BOOLEAN
    input.Body.restoreConfig.restoreOrder.groupKindDependencies[_].requiring.resourceGroup == STRING
    input.Body.restoreConfig.restoreOrder.groupKindDependencies[_].requiring.resourceKind == STRING
    input.Body.restoreConfig.restoreOrder.groupKindDependencies[_].satisfying.resourceGroup == STRING
    input.Body.restoreConfig.restoreOrder.groupKindDependencies[_].satisfying.resourceKind == STRING
    input.Body.restoreConfig.selectedApplications.namespacedNames[_].name == STRING
    input.Body.restoreConfig.selectedApplications.namespacedNames[_].namespace == STRING
    input.Body.restoreConfig.selectedNamespaces.namespaces[_] == STRING
    input.Body.restoreConfig.substitutionRules[_].newValue == STRING
    input.Body.restoreConfig.substitutionRules[_].originalValuePattern == STRING
    input.Body.restoreConfig.substitutionRules[_].targetGroupKinds[_].resourceGroup == STRING
    input.Body.restoreConfig.substitutionRules[_].targetGroupKinds[_].resourceKind == STRING
    input.Body.restoreConfig.substitutionRules[_].targetJsonPath == STRING
    input.Body.restoreConfig.substitutionRules[_].targetNamespaces[_] == STRING
    input.Body.restoreConfig.transformationRules[_].description == STRING
    input.Body.restoreConfig.transformationRules[_].fieldActions[_].fromPath == STRING
    input.Body.restoreConfig.transformationRules[_].fieldActions[_].op == enum_TransformationRuleActionOp[_]
    input.Body.restoreConfig.transformationRules[_].fieldActions[_].path == STRING
    input.Body.restoreConfig.transformationRules[_].fieldActions[_].value == STRING
    input.Body.restoreConfig.transformationRules[_].resourceFilter.groupKinds[_].resourceGroup == STRING
    input.Body.restoreConfig.transformationRules[_].resourceFilter.groupKinds[_].resourceKind == STRING
    input.Body.restoreConfig.transformationRules[_].resourceFilter.jsonPath == STRING
    input.Body.restoreConfig.transformationRules[_].resourceFilter.namespaces[_] == STRING
    input.Body.restoreConfig.volumeDataRestorePolicy == enum_RestoreConfigVolumeDataRestorePolicy[_]
    input.Body.restoreConfig.volumeDataRestorePolicyBindings[_].policy == enum_VolumeDataRestorePolicyBindingPolicy[_]
    input.Body.restoreConfig.volumeDataRestorePolicyBindings[_].volumeType == enum_VolumeDataRestorePolicyBindingVolumeType[_]
    input.ReqMap.parent == STRING
    input.Qs.restorePlanId == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.Qs.force == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.patch

enum_RestoreConfigClusterResourceConflictPolicy := [ "CLUSTER_RESOURCE_CONFLICT_POLICY_UNSPECIFIED", "USE_EXISTING_VERSION", "USE_BACKUP_VERSION" ]
enum_RestoreConfigNamespacedResourceRestoreMode := [ "NAMESPACED_RESOURCE_RESTORE_MODE_UNSPECIFIED", "DELETE_AND_RESTORE", "FAIL_ON_CONFLICT", "MERGE_SKIP_ON_CONFLICT", "MERGE_REPLACE_VOLUME_ON_CONFLICT", "MERGE_REPLACE_ON_CONFLICT" ]
enum_RestoreConfigVolumeDataRestorePolicy := [ "VOLUME_DATA_RESTORE_POLICY_UNSPECIFIED", "RESTORE_VOLUME_DATA_FROM_BACKUP", "REUSE_VOLUME_HANDLE_FROM_BACKUP", "NO_VOLUME_DATA_RESTORATION" ]
enum_TransformationRuleActionOp := [ "OP_UNSPECIFIED", "REMOVE", "MOVE", "COPY", "ADD", "TEST", "REPLACE" ]
enum_VolumeDataRestorePolicyBindingPolicy := [ "VOLUME_DATA_RESTORE_POLICY_UNSPECIFIED", "RESTORE_VOLUME_DATA_FROM_BACKUP", "REUSE_VOLUME_HANDLE_FROM_BACKUP", "NO_VOLUME_DATA_RESTORATION" ]
enum_VolumeDataRestorePolicyBindingVolumeType := [ "VOLUME_TYPE_UNSPECIFIED", "GCE_PERSISTENT_DISK" ]

valid {
    input.Body.backupPlan == STRING
    input.Body.cluster == STRING
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.restoreConfig.allNamespaces == BOOLEAN
    input.Body.restoreConfig.clusterResourceConflictPolicy == enum_RestoreConfigClusterResourceConflictPolicy[_]
    input.Body.restoreConfig.clusterResourceRestoreScope.allGroupKinds == BOOLEAN
    input.Body.restoreConfig.clusterResourceRestoreScope.excludedGroupKinds[_].resourceGroup == STRING
    input.Body.restoreConfig.clusterResourceRestoreScope.excludedGroupKinds[_].resourceKind == STRING
    input.Body.restoreConfig.clusterResourceRestoreScope.noGroupKinds == BOOLEAN
    input.Body.restoreConfig.clusterResourceRestoreScope.selectedGroupKinds[_].resourceGroup == STRING
    input.Body.restoreConfig.clusterResourceRestoreScope.selectedGroupKinds[_].resourceKind == STRING
    input.Body.restoreConfig.excludedNamespaces.namespaces[_] == STRING
    input.Body.restoreConfig.namespacedResourceRestoreMode == enum_RestoreConfigNamespacedResourceRestoreMode[_]
    input.Body.restoreConfig.noNamespaces == BOOLEAN
    input.Body.restoreConfig.restoreOrder.groupKindDependencies[_].requiring.resourceGroup == STRING
    input.Body.restoreConfig.restoreOrder.groupKindDependencies[_].requiring.resourceKind == STRING
    input.Body.restoreConfig.restoreOrder.groupKindDependencies[_].satisfying.resourceGroup == STRING
    input.Body.restoreConfig.restoreOrder.groupKindDependencies[_].satisfying.resourceKind == STRING
    input.Body.restoreConfig.selectedApplications.namespacedNames[_].name == STRING
    input.Body.restoreConfig.selectedApplications.namespacedNames[_].namespace == STRING
    input.Body.restoreConfig.selectedNamespaces.namespaces[_] == STRING
    input.Body.restoreConfig.substitutionRules[_].newValue == STRING
    input.Body.restoreConfig.substitutionRules[_].originalValuePattern == STRING
    input.Body.restoreConfig.substitutionRules[_].targetGroupKinds[_].resourceGroup == STRING
    input.Body.restoreConfig.substitutionRules[_].targetGroupKinds[_].resourceKind == STRING
    input.Body.restoreConfig.substitutionRules[_].targetJsonPath == STRING
    input.Body.restoreConfig.substitutionRules[_].targetNamespaces[_] == STRING
    input.Body.restoreConfig.transformationRules[_].description == STRING
    input.Body.restoreConfig.transformationRules[_].fieldActions[_].fromPath == STRING
    input.Body.restoreConfig.transformationRules[_].fieldActions[_].op == enum_TransformationRuleActionOp[_]
    input.Body.restoreConfig.transformationRules[_].fieldActions[_].path == STRING
    input.Body.restoreConfig.transformationRules[_].fieldActions[_].value == STRING
    input.Body.restoreConfig.transformationRules[_].resourceFilter.groupKinds[_].resourceGroup == STRING
    input.Body.restoreConfig.transformationRules[_].resourceFilter.groupKinds[_].resourceKind == STRING
    input.Body.restoreConfig.transformationRules[_].resourceFilter.jsonPath == STRING
    input.Body.restoreConfig.transformationRules[_].resourceFilter.namespaces[_] == STRING
    input.Body.restoreConfig.volumeDataRestorePolicy == enum_RestoreConfigVolumeDataRestorePolicy[_]
    input.Body.restoreConfig.volumeDataRestorePolicyBindings[_].policy == enum_VolumeDataRestorePolicyBindingPolicy[_]
    input.Body.restoreConfig.volumeDataRestorePolicyBindings[_].volumeType == enum_VolumeDataRestorePolicyBindingVolumeType[_]
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.create

enum_VolumeDataRestorePolicyOverridePolicy := [ "VOLUME_DATA_RESTORE_POLICY_UNSPECIFIED", "RESTORE_VOLUME_DATA_FROM_BACKUP", "REUSE_VOLUME_HANDLE_FROM_BACKUP", "NO_VOLUME_DATA_RESTORATION" ]

valid {
    input.Body.backup == STRING
    input.Body.description == STRING
    input.Body.filter.exclusionFilters[_].groupKind.resourceGroup == STRING
    input.Body.filter.exclusionFilters[_].groupKind.resourceKind == STRING
    input.Body.filter.exclusionFilters[_].labels.STRING == STRING
    input.Body.filter.exclusionFilters[_].name == STRING
    input.Body.filter.exclusionFilters[_].namespace == STRING
    input.Body.filter.inclusionFilters[_].groupKind.resourceGroup == STRING
    input.Body.filter.inclusionFilters[_].groupKind.resourceKind == STRING
    input.Body.filter.inclusionFilters[_].labels.STRING == STRING
    input.Body.filter.inclusionFilters[_].name == STRING
    input.Body.filter.inclusionFilters[_].namespace == STRING
    input.Body.labels.STRING == STRING
    input.Body.volumeDataRestorePolicyOverrides[_].policy == enum_VolumeDataRestorePolicyOverridePolicy[_]
    input.Body.volumeDataRestorePolicyOverrides[_].selectedPvcs.namespacedNames[_].name == STRING
    input.Body.volumeDataRestorePolicyOverrides[_].selectedPvcs.namespacedNames[_].namespace == STRING
    input.ReqMap.parent == STRING
    input.Qs.restoreId == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.Qs.force == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.patch

enum_VolumeDataRestorePolicyOverridePolicy := [ "VOLUME_DATA_RESTORE_POLICY_UNSPECIFIED", "RESTORE_VOLUME_DATA_FROM_BACKUP", "REUSE_VOLUME_HANDLE_FROM_BACKUP", "NO_VOLUME_DATA_RESTORATION" ]

valid {
    input.Body.backup == STRING
    input.Body.description == STRING
    input.Body.filter.exclusionFilters[_].groupKind.resourceGroup == STRING
    input.Body.filter.exclusionFilters[_].groupKind.resourceKind == STRING
    input.Body.filter.exclusionFilters[_].labels.STRING == STRING
    input.Body.filter.exclusionFilters[_].name == STRING
    input.Body.filter.exclusionFilters[_].namespace == STRING
    input.Body.filter.inclusionFilters[_].groupKind.resourceGroup == STRING
    input.Body.filter.inclusionFilters[_].groupKind.resourceKind == STRING
    input.Body.filter.inclusionFilters[_].labels.STRING == STRING
    input.Body.filter.inclusionFilters[_].name == STRING
    input.Body.filter.inclusionFilters[_].namespace == STRING
    input.Body.labels.STRING == STRING
    input.Body.volumeDataRestorePolicyOverrides[_].policy == enum_VolumeDataRestorePolicyOverridePolicy[_]
    input.Body.volumeDataRestorePolicyOverrides[_].selectedPvcs.namespacedNames[_].name == STRING
    input.Body.volumeDataRestorePolicyOverrides[_].selectedPvcs.namespacedNames[_].namespace == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.volumeRestores.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.volumeRestores.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.volumeRestores.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.volumeRestores.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.restores.volumeRestores.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

gkebackup.projects.locations.restorePlans.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}