METASTORE
metastore.projects.locations.federations.create
enum_BackendMetastoreMetastoreType := [ "METASTORE_TYPE_UNSPECIFIED", "BIGQUERY", "DATAPROC_METASTORE" ]
valid {
input.Body.backendMetastores.STRING.metastoreType == enum_BackendMetastoreMetastoreType[_]
input.Body.backendMetastores.STRING.name == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.version == STRING
input.ReqMap.parent == STRING
input.Qs.federationId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.federations.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.federations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.federations.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.federations.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.federations.patch
enum_BackendMetastoreMetastoreType := [ "METASTORE_TYPE_UNSPECIFIED", "BIGQUERY", "DATAPROC_METASTORE" ]
valid {
input.Body.backendMetastores.STRING.metastoreType == enum_BackendMetastoreMetastoreType[_]
input.Body.backendMetastores.STRING.name == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.version == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.federations.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.federations.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.operations.cancel
valid {
input.Body.STRING == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.operations.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.alterLocation
valid {
input.Body.locationUri == STRING
input.Body.resourceName == STRING
input.ReqMap.service == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.alterTableProperties
valid {
input.Body.properties.STRING == STRING
input.Body.tableName == STRING
input.Body.updateMask == STRING
input.ReqMap.service == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.backups.create
valid {
input.Body.description == STRING
input.Body.name == STRING
input.ReqMap.parent == STRING
input.Qs.backupId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.backups.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.backups.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.backups.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.backups.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.backups.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.backups.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.cancelMigration
valid {
input.Body.STRING == STRING
input.ReqMap.service == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.completeMigration
valid {
input.Body.STRING == STRING
input.ReqMap.service == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.create
enum_GoogleCloudMetastoreV2HiveMetastoreConfigEndpointProtocol := [ "ENDPOINT_PROTOCOL_UNSPECIFIED", "THRIFT", "GRPC" ]
valid {
input.Body.encryptionConfig.STRING == STRING
input.Body.hiveMetastoreConfig.auxiliaryVersions.STRING.configOverrides.STRING == STRING
input.Body.hiveMetastoreConfig.auxiliaryVersions.STRING.version == STRING
input.Body.hiveMetastoreConfig.configOverrides.STRING == STRING
input.Body.hiveMetastoreConfig.endpointProtocol == enum_GoogleCloudMetastoreV2HiveMetastoreConfigEndpointProtocol[_]
input.Body.hiveMetastoreConfig.version == STRING
input.Body.labels.STRING == STRING
input.Body.metadataIntegration.dataCatalogConfig.enabled == BOOLEAN
input.Body.name == STRING
input.Body.scalingConfig.scalingFactor == INTEGER
input.Body.scheduledBackup.backupLocation == STRING
input.Body.scheduledBackup.cronSchedule == STRING
input.Body.scheduledBackup.enabled == BOOLEAN
input.Body.scheduledBackup.timeZone == STRING
input.Body.warehouseGcsUri == STRING
input.ReqMap.parent == STRING
input.Qs.requestId == STRING
input.Qs.serviceId == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.databases.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.databases.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.databases.tables.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.databases.tables.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.databases.tables.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.databases.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.exportMetadata
enum_GoogleCloudMetastoreV2ExportMetadataRequestDatabaseDumpType := [ "TYPE_UNSPECIFIED", "MYSQL", "AVRO" ]
valid {
input.Body.databaseDumpType == enum_GoogleCloudMetastoreV2ExportMetadataRequestDatabaseDumpType[_]
input.Body.destinationGcsFolder == STRING
input.Body.requestId == STRING
input.ReqMap.service == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.importMetadata
enum_GoogleCloudMetastoreV2DatabaseDumpType := [ "TYPE_UNSPECIFIED", "MYSQL", "AVRO" ]
valid {
input.Body.databaseDump.gcsUri == STRING
input.Body.databaseDump.type == enum_GoogleCloudMetastoreV2DatabaseDumpType[_]
input.Body.description == STRING
input.Body.requestId == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.metadataImports.create
enum_DatabaseDumpDatabaseType := [ "DATABASE_TYPE_UNSPECIFIED", "MYSQL" ]
enum_DatabaseDumpType := [ "TYPE_UNSPECIFIED", "MYSQL", "AVRO" ]
valid {
input.Body.databaseDump.databaseType == enum_DatabaseDumpDatabaseType[_]
input.Body.databaseDump.gcsUri == STRING
input.Body.databaseDump.sourceDatabase == STRING
input.Body.databaseDump.type == enum_DatabaseDumpType[_]
input.Body.description == STRING
input.Body.name == STRING
input.ReqMap.parent == STRING
input.Qs.metadataImportId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.metadataImports.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.metadataImports.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.metadataImports.patch
enum_DatabaseDumpDatabaseType := [ "DATABASE_TYPE_UNSPECIFIED", "MYSQL" ]
enum_DatabaseDumpType := [ "TYPE_UNSPECIFIED", "MYSQL", "AVRO" ]
valid {
input.Body.databaseDump.databaseType == enum_DatabaseDumpDatabaseType[_]
input.Body.databaseDump.gcsUri == STRING
input.Body.databaseDump.sourceDatabase == STRING
input.Body.databaseDump.type == enum_DatabaseDumpType[_]
input.Body.description == STRING
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.migrationExecutions.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.migrationExecutions.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.migrationExecutions.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.moveTableToDatabase
valid {
input.Body.dbName == STRING
input.Body.destinationDbName == STRING
input.Body.tableName == STRING
input.ReqMap.service == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.patch
enum_GoogleCloudMetastoreV2HiveMetastoreConfigEndpointProtocol := [ "ENDPOINT_PROTOCOL_UNSPECIFIED", "THRIFT", "GRPC" ]
valid {
input.Body.encryptionConfig.STRING == STRING
input.Body.hiveMetastoreConfig.auxiliaryVersions.STRING.configOverrides.STRING == STRING
input.Body.hiveMetastoreConfig.auxiliaryVersions.STRING.version == STRING
input.Body.hiveMetastoreConfig.configOverrides.STRING == STRING
input.Body.hiveMetastoreConfig.endpointProtocol == enum_GoogleCloudMetastoreV2HiveMetastoreConfigEndpointProtocol[_]
input.Body.hiveMetastoreConfig.version == STRING
input.Body.labels.STRING == STRING
input.Body.metadataIntegration.dataCatalogConfig.enabled == BOOLEAN
input.Body.name == STRING
input.Body.scalingConfig.scalingFactor == INTEGER
input.Body.scheduledBackup.backupLocation == STRING
input.Body.scheduledBackup.cronSchedule == STRING
input.Body.scheduledBackup.enabled == BOOLEAN
input.Body.scheduledBackup.timeZone == STRING
input.Body.warehouseGcsUri == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.queryMetadata
valid {
input.Body.query == STRING
input.ReqMap.service == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.removeIamPolicy
valid {
input.Body.asynchronous == BOOLEAN
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.restore
enum_GoogleCloudMetastoreV2RestoreServiceRequestRestoreType := [ "RESTORE_TYPE_UNSPECIFIED", "FULL", "METADATA_ONLY" ]
valid {
input.Body.backup == STRING
input.Body.backupLocation == STRING
input.Body.requestId == STRING
input.Body.restoreType == enum_GoogleCloudMetastoreV2RestoreServiceRequestRestoreType[_]
input.ReqMap.service == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.startMigration
valid {
input.Body.migrationExecution.cloudSqlMigrationConfig.cdcConfig.bucket == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cdcConfig.password == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cdcConfig.reverseProxySubnet == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cdcConfig.rootPath == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cdcConfig.subnetIpRange == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cdcConfig.username == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cdcConfig.vpcNetwork == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cloudSqlConnectionConfig.hiveDatabaseName == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cloudSqlConnectionConfig.instanceConnectionName == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cloudSqlConnectionConfig.ipAddress == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cloudSqlConnectionConfig.natSubnet == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cloudSqlConnectionConfig.password == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cloudSqlConnectionConfig.port == INTEGER
input.Body.migrationExecution.cloudSqlMigrationConfig.cloudSqlConnectionConfig.proxySubnet == STRING
input.Body.migrationExecution.cloudSqlMigrationConfig.cloudSqlConnectionConfig.username == STRING
input.Body.requestId == STRING
input.ReqMap.service == STRING
input.ProviderMetadata.Region == STRING
}
metastore.projects.locations.services.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
Updated 4 days ago