MANAGEDIDENTITIES

managedidentities.projects.locations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.attachTrust

enum_TrustTrustDirection := [ "TRUST_DIRECTION_UNSPECIFIED", "INBOUND", "OUTBOUND", "BIDIRECTIONAL" ]
enum_TrustTrustType := [ "TRUST_TYPE_UNSPECIFIED", "FOREST", "EXTERNAL" ]

valid {
    input.Body.trust.selectiveAuthentication == BOOLEAN
    input.Body.trust.targetDnsIpAddresses[_] == STRING
    input.Body.trust.targetDomainName == STRING
    input.Body.trust.trustDirection == enum_TrustTrustDirection[_]
    input.Body.trust.trustHandshakeSecret == STRING
    input.Body.trust.trustType == enum_TrustTrustType[_]
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.backups.create

valid {
    input.Body.labels.STRING == STRING
    input.ReqMap.parent == STRING
    input.Qs.backupId == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.backups.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.backups.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.backups.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.backups.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.backups.patch

valid {
    input.Body.labels.STRING == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.backups.setIamPolicy

valid {
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.backups.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.checkMigrationPermission

valid {
    input.Body.STRING == STRING
    input.ReqMap.domain == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.create

valid {
    input.Body.admin == STRING
    input.Body.auditLogsEnabled == BOOLEAN
    input.Body.authorizedNetworks[_] == STRING
    input.Body.labels.STRING == STRING
    input.Body.locations[_] == STRING
    input.Body.name == STRING
    input.Body.reservedIpRange == STRING
    input.ReqMap.parent == STRING
    input.Qs.domainName == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.detachTrust

enum_TrustTrustDirection := [ "TRUST_DIRECTION_UNSPECIFIED", "INBOUND", "OUTBOUND", "BIDIRECTIONAL" ]
enum_TrustTrustType := [ "TRUST_TYPE_UNSPECIFIED", "FOREST", "EXTERNAL" ]

valid {
    input.Body.trust.selectiveAuthentication == BOOLEAN
    input.Body.trust.targetDnsIpAddresses[_] == STRING
    input.Body.trust.targetDomainName == STRING
    input.Body.trust.trustDirection == enum_TrustTrustDirection[_]
    input.Body.trust.trustHandshakeSecret == STRING
    input.Body.trust.trustType == enum_TrustTrustType[_]
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.disableMigration

valid {
    input.Body.STRING == STRING
    input.ReqMap.domain == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.domainJoinMachine

valid {
    input.Body.force == BOOLEAN
    input.Body.ouName == STRING
    input.Body.vmIdToken == STRING
    input.ReqMap.domain == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.enableMigration

valid {
    input.Body.migratingDomains[_].disableSidFiltering == BOOLEAN
    input.Body.migratingDomains[_].domainName == STRING
    input.ReqMap.domain == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.extendSchema

valid {
    input.Body.description == STRING
    input.Body.fileContents == STRING
    input.Body.gcsPath == STRING
    input.ReqMap.domain == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.getLdapssettings

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.patch

valid {
    input.Body.admin == STRING
    input.Body.auditLogsEnabled == BOOLEAN
    input.Body.authorizedNetworks[_] == STRING
    input.Body.labels.STRING == STRING
    input.Body.locations[_] == STRING
    input.Body.name == STRING
    input.Body.reservedIpRange == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.reconfigureTrust

valid {
    input.Body.targetDnsIpAddresses[_] == STRING
    input.Body.targetDomainName == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.resetAdminPassword

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.restore

valid {
    input.Body.backupId == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.setIamPolicy

valid {
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.sqlIntegrations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.sqlIntegrations.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.updateLdapssettings

valid {
    input.Body.certificatePassword == STRING
    input.Body.certificatePfx == STRING
    input.Body.name == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.domains.validateTrust

enum_TrustTrustDirection := [ "TRUST_DIRECTION_UNSPECIFIED", "INBOUND", "OUTBOUND", "BIDIRECTIONAL" ]
enum_TrustTrustType := [ "TRUST_TYPE_UNSPECIFIED", "FOREST", "EXTERNAL" ]

valid {
    input.Body.trust.selectiveAuthentication == BOOLEAN
    input.Body.trust.targetDnsIpAddresses[_] == STRING
    input.Body.trust.targetDomainName == STRING
    input.Body.trust.trustDirection == enum_TrustTrustDirection[_]
    input.Body.trust.trustHandshakeSecret == STRING
    input.Body.trust.trustType == enum_TrustTrustType[_]
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.operations.cancel

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.operations.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.peerings.create

valid {
    input.Body.authorizedNetwork == STRING
    input.Body.domainResource == STRING
    input.Body.labels.STRING == STRING
    input.ReqMap.parent == STRING
    input.Qs.peeringId == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.peerings.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.peerings.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.peerings.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.peerings.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.peerings.patch

valid {
    input.Body.authorizedNetwork == STRING
    input.Body.domainResource == STRING
    input.Body.labels.STRING == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.peerings.setIamPolicy

valid {
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.global.peerings.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

managedidentities.projects.locations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}