NETWORKCONNECTIVITY

networkconnectivity.projects.locations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.acceptSpoke

valid {
    input.Body.requestId == STRING
    input.Body.spokeUri == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.create

valid {
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.routingVpcs[_].uri == STRING
    input.ReqMap.parent == STRING
    input.Qs.hubId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.groups.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.groups.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.groups.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.groups.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.groups.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.listSpokes

enum_ViewParameter := [ "SPOKE_VIEW_UNSPECIFIED", "BASIC", "DETAILED" ]

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.Qs.spokeLocations == STRING
    input.Qs.view == enum_ViewParameter[_]
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.patch

valid {
    input.Body.description == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.routingVpcs[_].uri == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.rejectSpoke

valid {
    input.Body.details == STRING
    input.Body.requestId == STRING
    input.Body.spokeUri == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.routeTables.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.routeTables.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.routeTables.routes.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.routeTables.routes.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.hubs.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.policyBasedRoutes.create

enum_FilterProtocolVersion := [ "PROTOCOL_VERSION_UNSPECIFIED", "IPV4" ]
enum_PolicyBasedRouteNextHopOtherRoutes := [ "OTHER_ROUTES_UNSPECIFIED", "DEFAULT_ROUTING" ]

valid {
    input.Body.description == STRING
    input.Body.filter.destRange == STRING
    input.Body.filter.ipProtocol == STRING
    input.Body.filter.protocolVersion == enum_FilterProtocolVersion[_]
    input.Body.filter.srcRange == STRING
    input.Body.interconnectAttachment.region == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.network == STRING
    input.Body.nextHopIlbIp == STRING
    input.Body.nextHopOtherRoutes == enum_PolicyBasedRouteNextHopOtherRoutes[_]
    input.Body.priority == INTEGER
    input.Body.virtualMachine.tags[_] == STRING
    input.ReqMap.parent == STRING
    input.Qs.policyBasedRouteId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.policyBasedRoutes.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.policyBasedRoutes.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.policyBasedRoutes.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.policyBasedRoutes.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.policyBasedRoutes.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.global.policyBasedRoutes.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.internalRanges.create

enum_InternalRangeOverlaps := [ "OVERLAP_UNSPECIFIED", "OVERLAP_ROUTE_RANGE", "OVERLAP_EXISTING_SUBNET_RANGE" ]
enum_InternalRangePeering := [ "PEERING_UNSPECIFIED", "FOR_SELF", "FOR_PEER", "NOT_SHARED" ]
enum_InternalRangeUsage := [ "USAGE_UNSPECIFIED", "FOR_VPC", "EXTERNAL_TO_VPC" ]

valid {
    input.Body.createTime == STRING
    input.Body.description == STRING
    input.Body.ipCidrRange == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.network == STRING
    input.Body.overlaps[_] == enum_InternalRangeOverlaps[_]
    input.Body.peering == enum_InternalRangePeering[_]
    input.Body.prefixLength == INTEGER
    input.Body.targetCidrRange[_] == STRING
    input.Body.updateTime == STRING
    input.Body.usage == enum_InternalRangeUsage[_]
    input.ReqMap.parent == STRING
    input.Qs.internalRangeId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.internalRanges.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.internalRanges.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.internalRanges.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.internalRanges.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.internalRanges.patch

enum_InternalRangeOverlaps := [ "OVERLAP_UNSPECIFIED", "OVERLAP_ROUTE_RANGE", "OVERLAP_EXISTING_SUBNET_RANGE" ]
enum_InternalRangePeering := [ "PEERING_UNSPECIFIED", "FOR_SELF", "FOR_PEER", "NOT_SHARED" ]
enum_InternalRangeUsage := [ "USAGE_UNSPECIFIED", "FOR_VPC", "EXTERNAL_TO_VPC" ]

valid {
    input.Body.createTime == STRING
    input.Body.description == STRING
    input.Body.ipCidrRange == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.network == STRING
    input.Body.overlaps[_] == enum_InternalRangeOverlaps[_]
    input.Body.peering == enum_InternalRangePeering[_]
    input.Body.prefixLength == INTEGER
    input.Body.targetCidrRange[_] == STRING
    input.Body.updateTime == STRING
    input.Body.usage == enum_InternalRangeUsage[_]
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.internalRanges.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.internalRanges.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.operations.cancel

valid {
    input.Body.STRING == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.operations.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceClasses.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceClasses.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceClasses.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceClasses.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceClasses.patch

valid {
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceClasses.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceClasses.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionMaps.create

valid {
    input.Body.consumerPscConfigs[_].disableGlobalAccess == BOOLEAN
    input.Body.consumerPscConfigs[_].network == STRING
    input.Body.consumerPscConfigs[_].project == STRING
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.producerPscConfigs[_].serviceAttachmentUri == STRING
    input.Body.serviceClass == STRING
    input.Body.token == STRING
    input.ReqMap.parent == STRING
    input.Qs.requestId == STRING
    input.Qs.serviceConnectionMapId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionMaps.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionMaps.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionMaps.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionMaps.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionMaps.patch

valid {
    input.Body.consumerPscConfigs[_].disableGlobalAccess == BOOLEAN
    input.Body.consumerPscConfigs[_].network == STRING
    input.Body.consumerPscConfigs[_].project == STRING
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.producerPscConfigs[_].serviceAttachmentUri == STRING
    input.Body.serviceClass == STRING
    input.Body.token == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionMaps.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionMaps.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionPolicies.create

valid {
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.network == STRING
    input.Body.pscConfig.limit == STRING
    input.Body.pscConfig.subnetworks[_] == STRING
    input.Body.serviceClass == STRING
    input.ReqMap.parent == STRING
    input.Qs.requestId == STRING
    input.Qs.serviceConnectionPolicyId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionPolicies.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionPolicies.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionPolicies.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionPolicies.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionPolicies.patch

valid {
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.network == STRING
    input.Body.pscConfig.limit == STRING
    input.Body.pscConfig.subnetworks[_] == STRING
    input.Body.serviceClass == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionPolicies.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionPolicies.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionTokens.create

valid {
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.labels.STRING == STRING
    input.Body.name == STRING
    input.Body.network == STRING
    input.ReqMap.parent == STRING
    input.Qs.requestId == STRING
    input.Qs.serviceConnectionTokenId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionTokens.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionTokens.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.serviceConnectionTokens.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.spokes.create

valid {
    input.Body.description == STRING
    input.Body.group == STRING
    input.Body.hub == STRING
    input.Body.labels.STRING == STRING
    input.Body.linkedInterconnectAttachments.siteToSiteDataTransfer == BOOLEAN
    input.Body.linkedInterconnectAttachments.uris[_] == STRING
    input.Body.linkedRouterApplianceInstances.instances[_].ipAddress == STRING
    input.Body.linkedRouterApplianceInstances.instances[_].virtualMachine == STRING
    input.Body.linkedRouterApplianceInstances.siteToSiteDataTransfer == BOOLEAN
    input.Body.linkedVpcNetwork.excludeExportRanges[_] == STRING
    input.Body.linkedVpcNetwork.uri == STRING
    input.Body.linkedVpnTunnels.siteToSiteDataTransfer == BOOLEAN
    input.Body.linkedVpnTunnels.uris[_] == STRING
    input.Body.name == STRING
    input.ReqMap.parent == STRING
    input.Qs.requestId == STRING
    input.Qs.spokeId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.spokes.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.spokes.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.spokes.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.spokes.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.spokes.patch

valid {
    input.Body.description == STRING
    input.Body.group == STRING
    input.Body.hub == STRING
    input.Body.labels.STRING == STRING
    input.Body.linkedInterconnectAttachments.siteToSiteDataTransfer == BOOLEAN
    input.Body.linkedInterconnectAttachments.uris[_] == STRING
    input.Body.linkedRouterApplianceInstances.instances[_].ipAddress == STRING
    input.Body.linkedRouterApplianceInstances.instances[_].virtualMachine == STRING
    input.Body.linkedRouterApplianceInstances.siteToSiteDataTransfer == BOOLEAN
    input.Body.linkedVpcNetwork.excludeExportRanges[_] == STRING
    input.Body.linkedVpcNetwork.uri == STRING
    input.Body.linkedVpnTunnels.siteToSiteDataTransfer == BOOLEAN
    input.Body.linkedVpnTunnels.uris[_] == STRING
    input.Body.name == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.spokes.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

networkconnectivity.projects.locations.spokes.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}