NETWORKCONNECTIVITY
networkconnectivity.projects.locations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.acceptSpoke
valid {
input.Body.requestId == STRING
input.Body.spokeUri == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.create
enum_HubPolicyMode := [ "POLICY_MODE_UNSPECIFIED", "PRESET" ]
enum_HubPresetTopology := [ "PRESET_TOPOLOGY_UNSPECIFIED", "MESH", "STAR" ]
valid {
input.Body.description == STRING
input.Body.exportPsc == BOOLEAN
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.policyMode == enum_HubPolicyMode[_]
input.Body.presetTopology == enum_HubPresetTopology[_]
input.Body.routingVpcs[_].uri == STRING
input.ReqMap.parent == STRING
input.Qs.hubId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.groups.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.groups.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.groups.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.groups.patch
valid {
input.Body.autoAccept.autoAcceptProjects[_] == STRING
input.Body.description == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.groups.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.groups.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.listSpokes
enum_ViewParameter := [ "SPOKE_VIEW_UNSPECIFIED", "BASIC", "DETAILED" ]
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.Qs.spokeLocations == STRING
input.Qs.view == enum_ViewParameter[_]
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.patch
enum_HubPolicyMode := [ "POLICY_MODE_UNSPECIFIED", "PRESET" ]
enum_HubPresetTopology := [ "PRESET_TOPOLOGY_UNSPECIFIED", "MESH", "STAR" ]
valid {
input.Body.description == STRING
input.Body.exportPsc == BOOLEAN
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.policyMode == enum_HubPolicyMode[_]
input.Body.presetTopology == enum_HubPresetTopology[_]
input.Body.routingVpcs[_].uri == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.queryStatus
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.groupBy == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.rejectSpoke
valid {
input.Body.details == STRING
input.Body.requestId == STRING
input.Body.spokeUri == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.routeTables.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.routeTables.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.routeTables.routes.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.routeTables.routes.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.hubs.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.policyBasedRoutes.create
enum_FilterProtocolVersion := [ "PROTOCOL_VERSION_UNSPECIFIED", "IPV4" ]
enum_PolicyBasedRouteNextHopOtherRoutes := [ "OTHER_ROUTES_UNSPECIFIED", "DEFAULT_ROUTING" ]
valid {
input.Body.description == STRING
input.Body.filter.destRange == STRING
input.Body.filter.ipProtocol == STRING
input.Body.filter.protocolVersion == enum_FilterProtocolVersion[_]
input.Body.filter.srcRange == STRING
input.Body.interconnectAttachment.region == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.network == STRING
input.Body.nextHopIlbIp == STRING
input.Body.nextHopOtherRoutes == enum_PolicyBasedRouteNextHopOtherRoutes[_]
input.Body.priority == INTEGER
input.Body.virtualMachine.tags[_] == STRING
input.ReqMap.parent == STRING
input.Qs.policyBasedRouteId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.policyBasedRoutes.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.policyBasedRoutes.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.policyBasedRoutes.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.policyBasedRoutes.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.policyBasedRoutes.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.global.policyBasedRoutes.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.internalRanges.create
enum_InternalRangeOverlaps := [ "OVERLAP_UNSPECIFIED", "OVERLAP_ROUTE_RANGE", "OVERLAP_EXISTING_SUBNET_RANGE" ]
enum_InternalRangePeering := [ "PEERING_UNSPECIFIED", "FOR_SELF", "FOR_PEER", "NOT_SHARED" ]
enum_InternalRangeUsage := [ "USAGE_UNSPECIFIED", "FOR_VPC", "EXTERNAL_TO_VPC", "FOR_MIGRATION" ]
valid {
input.Body.createTime == STRING
input.Body.description == STRING
input.Body.ipCidrRange == STRING
input.Body.labels.STRING == STRING
input.Body.migration.source == STRING
input.Body.migration.target == STRING
input.Body.name == STRING
input.Body.network == STRING
input.Body.overlaps[_] == enum_InternalRangeOverlaps[_]
input.Body.peering == enum_InternalRangePeering[_]
input.Body.prefixLength == INTEGER
input.Body.targetCidrRange[_] == STRING
input.Body.updateTime == STRING
input.Body.usage == enum_InternalRangeUsage[_]
input.ReqMap.parent == STRING
input.Qs.internalRangeId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.internalRanges.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.internalRanges.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.internalRanges.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.internalRanges.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.internalRanges.patch
enum_InternalRangeOverlaps := [ "OVERLAP_UNSPECIFIED", "OVERLAP_ROUTE_RANGE", "OVERLAP_EXISTING_SUBNET_RANGE" ]
enum_InternalRangePeering := [ "PEERING_UNSPECIFIED", "FOR_SELF", "FOR_PEER", "NOT_SHARED" ]
enum_InternalRangeUsage := [ "USAGE_UNSPECIFIED", "FOR_VPC", "EXTERNAL_TO_VPC", "FOR_MIGRATION" ]
valid {
input.Body.createTime == STRING
input.Body.description == STRING
input.Body.ipCidrRange == STRING
input.Body.labels.STRING == STRING
input.Body.migration.source == STRING
input.Body.migration.target == STRING
input.Body.name == STRING
input.Body.network == STRING
input.Body.overlaps[_] == enum_InternalRangeOverlaps[_]
input.Body.peering == enum_InternalRangePeering[_]
input.Body.prefixLength == INTEGER
input.Body.targetCidrRange[_] == STRING
input.Body.updateTime == STRING
input.Body.usage == enum_InternalRangeUsage[_]
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.internalRanges.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.internalRanges.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.operations.cancel
valid {
input.Body.STRING == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.operations.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.regionalEndpoints.create
enum_RegionalEndpointAccessType := [ "ACCESS_TYPE_UNSPECIFIED", "GLOBAL", "REGIONAL" ]
valid {
input.Body.accessType == enum_RegionalEndpointAccessType[_]
input.Body.address == STRING
input.Body.description == STRING
input.Body.labels.STRING == STRING
input.Body.network == STRING
input.Body.subnetwork == STRING
input.Body.targetGoogleApi == STRING
input.ReqMap.parent == STRING
input.Qs.regionalEndpointId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.regionalEndpoints.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.regionalEndpoints.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.regionalEndpoints.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceClasses.delete
valid {
input.ReqMap.name == STRING
input.Qs.etag == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceClasses.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceClasses.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceClasses.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceClasses.patch
valid {
input.Body.description == STRING
input.Body.etag == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceClasses.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceClasses.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionMaps.create
enum_ConsumerPscConfigIpVersion := [ "IP_VERSION_UNSPECIFIED", "IPV4", "IPV6" ]
valid {
input.Body.consumerPscConfigs[_].consumerInstanceProject == STRING
input.Body.consumerPscConfigs[_].disableGlobalAccess == BOOLEAN
input.Body.consumerPscConfigs[_].ipVersion == enum_ConsumerPscConfigIpVersion[_]
input.Body.consumerPscConfigs[_].network == STRING
input.Body.consumerPscConfigs[_].producerInstanceId == STRING
input.Body.consumerPscConfigs[_].producerInstanceMetadata.STRING == STRING
input.Body.consumerPscConfigs[_].project == STRING
input.Body.description == STRING
input.Body.etag == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.producerPscConfigs[_].serviceAttachmentUri == STRING
input.Body.serviceClass == STRING
input.Body.token == STRING
input.ReqMap.parent == STRING
input.Qs.requestId == STRING
input.Qs.serviceConnectionMapId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionMaps.delete
valid {
input.ReqMap.name == STRING
input.Qs.etag == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionMaps.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionMaps.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionMaps.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionMaps.patch
enum_ConsumerPscConfigIpVersion := [ "IP_VERSION_UNSPECIFIED", "IPV4", "IPV6" ]
valid {
input.Body.consumerPscConfigs[_].consumerInstanceProject == STRING
input.Body.consumerPscConfigs[_].disableGlobalAccess == BOOLEAN
input.Body.consumerPscConfigs[_].ipVersion == enum_ConsumerPscConfigIpVersion[_]
input.Body.consumerPscConfigs[_].network == STRING
input.Body.consumerPscConfigs[_].producerInstanceId == STRING
input.Body.consumerPscConfigs[_].producerInstanceMetadata.STRING == STRING
input.Body.consumerPscConfigs[_].project == STRING
input.Body.description == STRING
input.Body.etag == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.producerPscConfigs[_].serviceAttachmentUri == STRING
input.Body.serviceClass == STRING
input.Body.token == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionMaps.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionMaps.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionPolicies.create
enum_PscConfigProducerInstanceLocation := [ "PRODUCER_INSTANCE_LOCATION_UNSPECIFIED", "CUSTOM_RESOURCE_HIERARCHY_LEVELS" ]
valid {
input.Body.description == STRING
input.Body.etag == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.network == STRING
input.Body.pscConfig.allowedGoogleProducersResourceHierarchyLevel[_] == STRING
input.Body.pscConfig.limit == STRING
input.Body.pscConfig.producerInstanceLocation == enum_PscConfigProducerInstanceLocation[_]
input.Body.pscConfig.subnetworks[_] == STRING
input.Body.serviceClass == STRING
input.ReqMap.parent == STRING
input.Qs.requestId == STRING
input.Qs.serviceConnectionPolicyId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionPolicies.delete
valid {
input.ReqMap.name == STRING
input.Qs.etag == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionPolicies.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionPolicies.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionPolicies.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionPolicies.patch
enum_PscConfigProducerInstanceLocation := [ "PRODUCER_INSTANCE_LOCATION_UNSPECIFIED", "CUSTOM_RESOURCE_HIERARCHY_LEVELS" ]
valid {
input.Body.description == STRING
input.Body.etag == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.network == STRING
input.Body.pscConfig.allowedGoogleProducersResourceHierarchyLevel[_] == STRING
input.Body.pscConfig.limit == STRING
input.Body.pscConfig.producerInstanceLocation == enum_PscConfigProducerInstanceLocation[_]
input.Body.pscConfig.subnetworks[_] == STRING
input.Body.serviceClass == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionPolicies.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionPolicies.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionTokens.create
valid {
input.Body.description == STRING
input.Body.etag == STRING
input.Body.labels.STRING == STRING
input.Body.name == STRING
input.Body.network == STRING
input.ReqMap.parent == STRING
input.Qs.requestId == STRING
input.Qs.serviceConnectionTokenId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionTokens.delete
valid {
input.ReqMap.name == STRING
input.Qs.etag == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionTokens.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.serviceConnectionTokens.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.spokes.create
valid {
input.Body.description == STRING
input.Body.group == STRING
input.Body.hub == STRING
input.Body.labels.STRING == STRING
input.Body.linkedInterconnectAttachments.includeImportRanges[_] == STRING
input.Body.linkedInterconnectAttachments.siteToSiteDataTransfer == BOOLEAN
input.Body.linkedInterconnectAttachments.uris[_] == STRING
input.Body.linkedProducerVpcNetwork.excludeExportRanges[_] == STRING
input.Body.linkedProducerVpcNetwork.includeExportRanges[_] == STRING
input.Body.linkedProducerVpcNetwork.network == STRING
input.Body.linkedProducerVpcNetwork.peering == STRING
input.Body.linkedRouterApplianceInstances.includeImportRanges[_] == STRING
input.Body.linkedRouterApplianceInstances.instances[_].ipAddress == STRING
input.Body.linkedRouterApplianceInstances.instances[_].virtualMachine == STRING
input.Body.linkedRouterApplianceInstances.siteToSiteDataTransfer == BOOLEAN
input.Body.linkedVpcNetwork.excludeExportRanges[_] == STRING
input.Body.linkedVpcNetwork.includeExportRanges[_] == STRING
input.Body.linkedVpcNetwork.uri == STRING
input.Body.linkedVpnTunnels.includeImportRanges[_] == STRING
input.Body.linkedVpnTunnels.siteToSiteDataTransfer == BOOLEAN
input.Body.linkedVpnTunnels.uris[_] == STRING
input.Body.name == STRING
input.ReqMap.parent == STRING
input.Qs.requestId == STRING
input.Qs.spokeId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.spokes.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.spokes.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.spokes.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.spokes.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.spokes.patch
valid {
input.Body.description == STRING
input.Body.group == STRING
input.Body.hub == STRING
input.Body.labels.STRING == STRING
input.Body.linkedInterconnectAttachments.includeImportRanges[_] == STRING
input.Body.linkedInterconnectAttachments.siteToSiteDataTransfer == BOOLEAN
input.Body.linkedInterconnectAttachments.uris[_] == STRING
input.Body.linkedProducerVpcNetwork.excludeExportRanges[_] == STRING
input.Body.linkedProducerVpcNetwork.includeExportRanges[_] == STRING
input.Body.linkedProducerVpcNetwork.network == STRING
input.Body.linkedProducerVpcNetwork.peering == STRING
input.Body.linkedRouterApplianceInstances.includeImportRanges[_] == STRING
input.Body.linkedRouterApplianceInstances.instances[_].ipAddress == STRING
input.Body.linkedRouterApplianceInstances.instances[_].virtualMachine == STRING
input.Body.linkedRouterApplianceInstances.siteToSiteDataTransfer == BOOLEAN
input.Body.linkedVpcNetwork.excludeExportRanges[_] == STRING
input.Body.linkedVpcNetwork.includeExportRanges[_] == STRING
input.Body.linkedVpcNetwork.uri == STRING
input.Body.linkedVpnTunnels.includeImportRanges[_] == STRING
input.Body.linkedVpnTunnels.siteToSiteDataTransfer == BOOLEAN
input.Body.linkedVpnTunnels.uris[_] == STRING
input.Body.name == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.spokes.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
networkconnectivity.projects.locations.spokes.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
Updated 6 days ago