METASTORE

metastore.projects.locations.federations.create

enum_BackendMetastoreMetastoreType := [ "METASTORE_TYPE_UNSPECIFIED", "BIGQUERY", "DATAPROC_METASTORE" ]

valid {
    input.Body.backendMetastores.STRING.metastoreType == enum_BackendMetastoreMetastoreType[_]
    input.Body.backendMetastores.STRING.name == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.version == STRING
    input.ReqMap.parent == STRING
    input.Qs.federationId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.federations.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.federations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.federations.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.federations.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.federations.patch

enum_BackendMetastoreMetastoreType := [ "METASTORE_TYPE_UNSPECIFIED", "BIGQUERY", "DATAPROC_METASTORE" ]

valid {
    input.Body.backendMetastores.STRING.metastoreType == enum_BackendMetastoreMetastoreType[_]
    input.Body.backendMetastores.STRING.name == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.version == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.federations.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.federations.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.operations.cancel

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.operations.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.alterLocation

valid {
    input.Body.locationUri == STRING
    input.Body.resourceName == STRING
    input.ReqMap.service == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.alterTableProperties

valid {
    input.Body.properties.STRING == STRING
    input.Body.tableName == STRING
    input.Body.updateMask == STRING
    input.ReqMap.service == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.backups.create

valid {
    input.Body.description == STRING
    input.Body.name == STRING
    input.ReqMap.parent == STRING
    input.Qs.backupId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.backups.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.backups.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.backups.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.backups.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.backups.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.backups.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.create

enum_HiveMetastoreConfigEndpointProtocol := [ "ENDPOINT_PROTOCOL_UNSPECIFIED", "THRIFT", "GRPC" ]
enum_MaintenanceWindowDayOfWeek := [ "DAY_OF_WEEK_UNSPECIFIED", "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" ]
enum_ScalingConfigInstanceSize := [ "INSTANCE_SIZE_UNSPECIFIED", "EXTRA_SMALL", "SMALL", "MEDIUM", "LARGE", "EXTRA_LARGE" ]
enum_ServiceDatabaseType := [ "DATABASE_TYPE_UNSPECIFIED", "MYSQL", "SPANNER" ]
enum_ServiceReleaseChannel := [ "RELEASE_CHANNEL_UNSPECIFIED", "CANARY", "STABLE" ]
enum_ServiceTier := [ "TIER_UNSPECIFIED", "DEVELOPER", "ENTERPRISE" ]
enum_TelemetryConfigLogFormat := [ "LOG_FORMAT_UNSPECIFIED", "LEGACY", "JSON" ]

valid {
    input.Body.databaseType == enum_ServiceDatabaseType[_]
    input.Body.encryptionConfig.kmsKey == STRING
    input.Body.hiveMetastoreConfig.auxiliaryVersions.STRING.configOverrides.STRING == STRING
    input.Body.hiveMetastoreConfig.auxiliaryVersions.STRING.version == STRING
    input.Body.hiveMetastoreConfig.configOverrides.STRING == STRING
    input.Body.hiveMetastoreConfig.endpointProtocol == enum_HiveMetastoreConfigEndpointProtocol[_]
    input.Body.hiveMetastoreConfig.kerberosConfig.keytab.cloudSecret == STRING
    input.Body.hiveMetastoreConfig.kerberosConfig.krb5ConfigGcsUri == STRING
    input.Body.hiveMetastoreConfig.kerberosConfig.principal == STRING
    input.Body.hiveMetastoreConfig.version == STRING
    input.Body.labels.STRING == STRING
    input.Body.maintenanceWindow.dayOfWeek == enum_MaintenanceWindowDayOfWeek[_]
    input.Body.maintenanceWindow.hourOfDay == INTEGER
    input.Body.metadataIntegration.dataCatalogConfig.enabled == BOOLEAN
    input.Body.name == STRING
    input.Body.network == STRING
    input.Body.networkConfig.consumers[_].subnetwork == STRING
    input.Body.port == INTEGER
    input.Body.releaseChannel == enum_ServiceReleaseChannel[_]
    input.Body.scalingConfig.instanceSize == enum_ScalingConfigInstanceSize[_]
    input.Body.scalingConfig.scalingFactor == NUMBER
    input.Body.telemetryConfig.logFormat == enum_TelemetryConfigLogFormat[_]
    input.Body.tier == enum_ServiceTier[_]
    input.ReqMap.parent == STRING
    input.Qs.requestId == STRING
    input.Qs.serviceId == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.databases.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.databases.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.databases.tables.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.databases.tables.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.databases.tables.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.databases.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.exportMetadata

enum_ExportMetadataRequestDatabaseDumpType := [ "TYPE_UNSPECIFIED", "MYSQL", "AVRO" ]

valid {
    input.Body.databaseDumpType == enum_ExportMetadataRequestDatabaseDumpType[_]
    input.Body.destinationGcsFolder == STRING
    input.Body.requestId == STRING
    input.ReqMap.service == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.metadataImports.create

enum_DatabaseDumpDatabaseType := [ "DATABASE_TYPE_UNSPECIFIED", "MYSQL" ]
enum_DatabaseDumpType := [ "TYPE_UNSPECIFIED", "MYSQL", "AVRO" ]

valid {
    input.Body.databaseDump.databaseType == enum_DatabaseDumpDatabaseType[_]
    input.Body.databaseDump.gcsUri == STRING
    input.Body.databaseDump.sourceDatabase == STRING
    input.Body.databaseDump.type == enum_DatabaseDumpType[_]
    input.Body.description == STRING
    input.Body.name == STRING
    input.ReqMap.parent == STRING
    input.Qs.metadataImportId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.metadataImports.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.metadataImports.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.metadataImports.patch

enum_DatabaseDumpDatabaseType := [ "DATABASE_TYPE_UNSPECIFIED", "MYSQL" ]
enum_DatabaseDumpType := [ "TYPE_UNSPECIFIED", "MYSQL", "AVRO" ]

valid {
    input.Body.databaseDump.databaseType == enum_DatabaseDumpDatabaseType[_]
    input.Body.databaseDump.gcsUri == STRING
    input.Body.databaseDump.sourceDatabase == STRING
    input.Body.databaseDump.type == enum_DatabaseDumpType[_]
    input.Body.description == STRING
    input.Body.name == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.migrationExecutions.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.moveTableToDatabase

valid {
    input.Body.dbName == STRING
    input.Body.destinationDbName == STRING
    input.Body.tableName == STRING
    input.ReqMap.service == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.patch

enum_HiveMetastoreConfigEndpointProtocol := [ "ENDPOINT_PROTOCOL_UNSPECIFIED", "THRIFT", "GRPC" ]
enum_MaintenanceWindowDayOfWeek := [ "DAY_OF_WEEK_UNSPECIFIED", "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" ]
enum_ScalingConfigInstanceSize := [ "INSTANCE_SIZE_UNSPECIFIED", "EXTRA_SMALL", "SMALL", "MEDIUM", "LARGE", "EXTRA_LARGE" ]
enum_ServiceDatabaseType := [ "DATABASE_TYPE_UNSPECIFIED", "MYSQL", "SPANNER" ]
enum_ServiceReleaseChannel := [ "RELEASE_CHANNEL_UNSPECIFIED", "CANARY", "STABLE" ]
enum_ServiceTier := [ "TIER_UNSPECIFIED", "DEVELOPER", "ENTERPRISE" ]
enum_TelemetryConfigLogFormat := [ "LOG_FORMAT_UNSPECIFIED", "LEGACY", "JSON" ]

valid {
    input.Body.databaseType == enum_ServiceDatabaseType[_]
    input.Body.encryptionConfig.kmsKey == STRING
    input.Body.hiveMetastoreConfig.auxiliaryVersions.STRING.configOverrides.STRING == STRING
    input.Body.hiveMetastoreConfig.auxiliaryVersions.STRING.version == STRING
    input.Body.hiveMetastoreConfig.configOverrides.STRING == STRING
    input.Body.hiveMetastoreConfig.endpointProtocol == enum_HiveMetastoreConfigEndpointProtocol[_]
    input.Body.hiveMetastoreConfig.kerberosConfig.keytab.cloudSecret == STRING
    input.Body.hiveMetastoreConfig.kerberosConfig.krb5ConfigGcsUri == STRING
    input.Body.hiveMetastoreConfig.kerberosConfig.principal == STRING
    input.Body.hiveMetastoreConfig.version == STRING
    input.Body.labels.STRING == STRING
    input.Body.maintenanceWindow.dayOfWeek == enum_MaintenanceWindowDayOfWeek[_]
    input.Body.maintenanceWindow.hourOfDay == INTEGER
    input.Body.metadataIntegration.dataCatalogConfig.enabled == BOOLEAN
    input.Body.name == STRING
    input.Body.network == STRING
    input.Body.networkConfig.consumers[_].subnetwork == STRING
    input.Body.port == INTEGER
    input.Body.releaseChannel == enum_ServiceReleaseChannel[_]
    input.Body.scalingConfig.instanceSize == enum_ScalingConfigInstanceSize[_]
    input.Body.scalingConfig.scalingFactor == NUMBER
    input.Body.telemetryConfig.logFormat == enum_TelemetryConfigLogFormat[_]
    input.Body.tier == enum_ServiceTier[_]
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.queryMetadata

valid {
    input.Body.query == STRING
    input.ReqMap.service == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.removeIamPolicy

valid {
    input.Body.asynchronous == BOOLEAN
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.restore

enum_RestoreServiceRequestRestoreType := [ "RESTORE_TYPE_UNSPECIFIED", "FULL", "METADATA_ONLY" ]

valid {
    input.Body.backup == STRING
    input.Body.requestId == STRING
    input.Body.restoreType == enum_RestoreServiceRequestRestoreType[_]
    input.ReqMap.service == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

metastore.projects.locations.services.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}