LOOKER
looker.projects.locations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.backups.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.backups.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.backups.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.create
enum_CustomDomainState := [ "CUSTOM_DOMAIN_STATE_UNSPECIFIED", "UNVERIFIED", "VERIFIED", "MODIFYING", "AVAILABLE", "UNAVAILABLE", "UNKNOWN" ]
enum_InstancePlatformEdition := [ "PLATFORM_EDITION_UNSPECIFIED", "LOOKER_CORE_TRIAL", "LOOKER_CORE_STANDARD", "LOOKER_CORE_STANDARD_ANNUAL", "LOOKER_CORE_ENTERPRISE_ANNUAL", "LOOKER_CORE_EMBED_ANNUAL", "LOOKER_CORE_NONPROD_STANDARD_ANNUAL", "LOOKER_CORE_NONPROD_ENTERPRISE_ANNUAL", "LOOKER_CORE_NONPROD_EMBED_ANNUAL" ]
enum_MaintenanceWindowDayOfWeek := [ "DAY_OF_WEEK_UNSPECIFIED", "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" ]
valid {
input.Body.adminSettings.allowedEmailDomains[_] == STRING
input.Body.consumerNetwork == STRING
input.Body.customDomain.domain == STRING
input.Body.customDomain.state == enum_CustomDomainState[_]
input.Body.denyMaintenancePeriod.endDate.day == INTEGER
input.Body.denyMaintenancePeriod.endDate.month == INTEGER
input.Body.denyMaintenancePeriod.endDate.year == INTEGER
input.Body.denyMaintenancePeriod.startDate.day == INTEGER
input.Body.denyMaintenancePeriod.startDate.month == INTEGER
input.Body.denyMaintenancePeriod.startDate.year == INTEGER
input.Body.denyMaintenancePeriod.time.hours == INTEGER
input.Body.denyMaintenancePeriod.time.minutes == INTEGER
input.Body.denyMaintenancePeriod.time.nanos == INTEGER
input.Body.denyMaintenancePeriod.time.seconds == INTEGER
input.Body.encryptionConfig.kmsKeyName == STRING
input.Body.fipsEnabled == BOOLEAN
input.Body.geminiEnabled == BOOLEAN
input.Body.linkedLspProjectNumber == STRING
input.Body.maintenanceSchedule.endTime == STRING
input.Body.maintenanceSchedule.startTime == STRING
input.Body.maintenanceWindow.dayOfWeek == enum_MaintenanceWindowDayOfWeek[_]
input.Body.maintenanceWindow.startTime.hours == INTEGER
input.Body.maintenanceWindow.startTime.minutes == INTEGER
input.Body.maintenanceWindow.startTime.nanos == INTEGER
input.Body.maintenanceWindow.startTime.seconds == INTEGER
input.Body.oauthConfig.clientId == STRING
input.Body.oauthConfig.clientSecret == STRING
input.Body.platformEdition == enum_InstancePlatformEdition[_]
input.Body.privateIpEnabled == BOOLEAN
input.Body.pscConfig.allowedVpcs[_] == STRING
input.Body.pscConfig.serviceAttachments[_].localFqdn == STRING
input.Body.pscConfig.serviceAttachments[_].targetServiceAttachmentUri == STRING
input.Body.pscEnabled == BOOLEAN
input.Body.publicIpEnabled == BOOLEAN
input.Body.reservedRange == STRING
input.Body.userMetadata.additionalDeveloperUserCount == INTEGER
input.Body.userMetadata.additionalStandardUserCount == INTEGER
input.Body.userMetadata.additionalViewerUserCount == INTEGER
input.ReqMap.parent == STRING
input.Qs.instanceId == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.delete
valid {
input.ReqMap.name == STRING
input.Qs.force == BOOLEAN
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.export
valid {
input.Body.encryptionConfig.kmsKeyName == STRING
input.Body.gcsUri == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.import
valid {
input.Body.gcsUri == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.patch
enum_CustomDomainState := [ "CUSTOM_DOMAIN_STATE_UNSPECIFIED", "UNVERIFIED", "VERIFIED", "MODIFYING", "AVAILABLE", "UNAVAILABLE", "UNKNOWN" ]
enum_InstancePlatformEdition := [ "PLATFORM_EDITION_UNSPECIFIED", "LOOKER_CORE_TRIAL", "LOOKER_CORE_STANDARD", "LOOKER_CORE_STANDARD_ANNUAL", "LOOKER_CORE_ENTERPRISE_ANNUAL", "LOOKER_CORE_EMBED_ANNUAL", "LOOKER_CORE_NONPROD_STANDARD_ANNUAL", "LOOKER_CORE_NONPROD_ENTERPRISE_ANNUAL", "LOOKER_CORE_NONPROD_EMBED_ANNUAL" ]
enum_MaintenanceWindowDayOfWeek := [ "DAY_OF_WEEK_UNSPECIFIED", "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" ]
valid {
input.Body.adminSettings.allowedEmailDomains[_] == STRING
input.Body.consumerNetwork == STRING
input.Body.customDomain.domain == STRING
input.Body.customDomain.state == enum_CustomDomainState[_]
input.Body.denyMaintenancePeriod.endDate.day == INTEGER
input.Body.denyMaintenancePeriod.endDate.month == INTEGER
input.Body.denyMaintenancePeriod.endDate.year == INTEGER
input.Body.denyMaintenancePeriod.startDate.day == INTEGER
input.Body.denyMaintenancePeriod.startDate.month == INTEGER
input.Body.denyMaintenancePeriod.startDate.year == INTEGER
input.Body.denyMaintenancePeriod.time.hours == INTEGER
input.Body.denyMaintenancePeriod.time.minutes == INTEGER
input.Body.denyMaintenancePeriod.time.nanos == INTEGER
input.Body.denyMaintenancePeriod.time.seconds == INTEGER
input.Body.encryptionConfig.kmsKeyName == STRING
input.Body.fipsEnabled == BOOLEAN
input.Body.geminiEnabled == BOOLEAN
input.Body.linkedLspProjectNumber == STRING
input.Body.maintenanceSchedule.endTime == STRING
input.Body.maintenanceSchedule.startTime == STRING
input.Body.maintenanceWindow.dayOfWeek == enum_MaintenanceWindowDayOfWeek[_]
input.Body.maintenanceWindow.startTime.hours == INTEGER
input.Body.maintenanceWindow.startTime.minutes == INTEGER
input.Body.maintenanceWindow.startTime.nanos == INTEGER
input.Body.maintenanceWindow.startTime.seconds == INTEGER
input.Body.oauthConfig.clientId == STRING
input.Body.oauthConfig.clientSecret == STRING
input.Body.platformEdition == enum_InstancePlatformEdition[_]
input.Body.privateIpEnabled == BOOLEAN
input.Body.pscConfig.allowedVpcs[_] == STRING
input.Body.pscConfig.serviceAttachments[_].localFqdn == STRING
input.Body.pscConfig.serviceAttachments[_].targetServiceAttachmentUri == STRING
input.Body.pscEnabled == BOOLEAN
input.Body.publicIpEnabled == BOOLEAN
input.Body.reservedRange == STRING
input.Body.userMetadata.additionalDeveloperUserCount == INTEGER
input.Body.userMetadata.additionalStandardUserCount == INTEGER
input.Body.userMetadata.additionalViewerUserCount == INTEGER
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.restart
valid {
input.Body.STRING == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.instances.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.operations.cancel
valid {
input.Body.STRING == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.operations.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
looker.projects.locations.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
Updated 5 days ago