MANAGEDIDENTITIES
managedidentities.projects.locations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.attachTrust
enum_TrustTrustDirection := [ "TRUST_DIRECTION_UNSPECIFIED", "INBOUND", "OUTBOUND", "BIDIRECTIONAL" ]
enum_TrustTrustType := [ "TRUST_TYPE_UNSPECIFIED", "FOREST", "EXTERNAL" ]
valid {
input.Body.trust.selectiveAuthentication == BOOLEAN
input.Body.trust.targetDnsIpAddresses[_] == STRING
input.Body.trust.targetDomainName == STRING
input.Body.trust.trustDirection == enum_TrustTrustDirection[_]
input.Body.trust.trustHandshakeSecret == STRING
input.Body.trust.trustType == enum_TrustTrustType[_]
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.backups.create
valid {
input.Body.labels.STRING == STRING
input.ReqMap.parent == STRING
input.Qs.backupId == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.backups.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.backups.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.backups.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.backups.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.backups.patch
valid {
input.Body.labels.STRING == STRING
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.backups.setIamPolicy
valid {
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.backups.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.checkMigrationPermission
valid {
input.Body.STRING == STRING
input.ReqMap.domain == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.create
valid {
input.Body.admin == STRING
input.Body.auditLogsEnabled == BOOLEAN
input.Body.authorizedNetworks[_] == STRING
input.Body.labels.STRING == STRING
input.Body.locations[_] == STRING
input.Body.name == STRING
input.Body.reservedIpRange == STRING
input.ReqMap.parent == STRING
input.Qs.domainName == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.detachTrust
enum_TrustTrustDirection := [ "TRUST_DIRECTION_UNSPECIFIED", "INBOUND", "OUTBOUND", "BIDIRECTIONAL" ]
enum_TrustTrustType := [ "TRUST_TYPE_UNSPECIFIED", "FOREST", "EXTERNAL" ]
valid {
input.Body.trust.selectiveAuthentication == BOOLEAN
input.Body.trust.targetDnsIpAddresses[_] == STRING
input.Body.trust.targetDomainName == STRING
input.Body.trust.trustDirection == enum_TrustTrustDirection[_]
input.Body.trust.trustHandshakeSecret == STRING
input.Body.trust.trustType == enum_TrustTrustType[_]
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.disableMigration
valid {
input.Body.STRING == STRING
input.ReqMap.domain == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.domainJoinMachine
valid {
input.Body.force == BOOLEAN
input.Body.ouName == STRING
input.Body.vmIdToken == STRING
input.ReqMap.domain == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.enableMigration
valid {
input.Body.migratingDomains[_].disableSidFiltering == BOOLEAN
input.Body.migratingDomains[_].domainName == STRING
input.ReqMap.domain == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.extendSchema
valid {
input.Body.description == STRING
input.Body.fileContents == STRING
input.Body.gcsPath == STRING
input.ReqMap.domain == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.getLdapssettings
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.patch
valid {
input.Body.admin == STRING
input.Body.auditLogsEnabled == BOOLEAN
input.Body.authorizedNetworks[_] == STRING
input.Body.labels.STRING == STRING
input.Body.locations[_] == STRING
input.Body.name == STRING
input.Body.reservedIpRange == STRING
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.reconfigureTrust
valid {
input.Body.targetDnsIpAddresses[_] == STRING
input.Body.targetDomainName == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.resetAdminPassword
valid {
input.Body.STRING == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.restore
valid {
input.Body.backupId == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.setIamPolicy
valid {
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.sqlIntegrations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.sqlIntegrations.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.updateLdapssettings
valid {
input.Body.certificatePassword == STRING
input.Body.certificatePfx == STRING
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.domains.validateTrust
enum_TrustTrustDirection := [ "TRUST_DIRECTION_UNSPECIFIED", "INBOUND", "OUTBOUND", "BIDIRECTIONAL" ]
enum_TrustTrustType := [ "TRUST_TYPE_UNSPECIFIED", "FOREST", "EXTERNAL" ]
valid {
input.Body.trust.selectiveAuthentication == BOOLEAN
input.Body.trust.targetDnsIpAddresses[_] == STRING
input.Body.trust.targetDomainName == STRING
input.Body.trust.trustDirection == enum_TrustTrustDirection[_]
input.Body.trust.trustHandshakeSecret == STRING
input.Body.trust.trustType == enum_TrustTrustType[_]
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.operations.cancel
valid {
input.Body.STRING == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.operations.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.peerings.create
valid {
input.Body.authorizedNetwork == STRING
input.Body.domainResource == STRING
input.Body.labels.STRING == STRING
input.ReqMap.parent == STRING
input.Qs.peeringId == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.peerings.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.peerings.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.peerings.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.peerings.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.peerings.patch
valid {
input.Body.authorizedNetwork == STRING
input.Body.domainResource == STRING
input.Body.labels.STRING == STRING
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.peerings.setIamPolicy
valid {
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.global.peerings.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
managedidentities.projects.locations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
Updated 5 days ago