POLICYSIMULATOR

policysimulator.folders.locations.orgPolicyViolationsPreviews.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.create

enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource := [ "LOG_SOURCE_UNSPECIFIED", "RECENT_ACCESSES" ]
enum_GoogleIamV1AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.config.logSource == enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].logType == enum_GoogleIamV1AuditLogConfigLogType[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].service == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.description == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.expression == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.location == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.title == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].members[_] == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].role == STRING
    input.Body.config.policyOverlay.STRING.etag == STRING
    input.Body.config.policyOverlay.STRING.version == INTEGER
    input.ReqMap.parent == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.results.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.orgPolicyViolationsPreviews.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.create

enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource := [ "LOG_SOURCE_UNSPECIFIED", "RECENT_ACCESSES" ]
enum_GoogleIamV1AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.config.logSource == enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].logType == enum_GoogleIamV1AuditLogConfigLogType[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].service == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.description == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.expression == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.location == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.title == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].members[_] == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].role == STRING
    input.Body.config.policyOverlay.STRING.etag == STRING
    input.Body.config.policyOverlay.STRING.version == INTEGER
    input.ReqMap.parent == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.results.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.orgPolicyViolationsPreviews.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.create

enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource := [ "LOG_SOURCE_UNSPECIFIED", "RECENT_ACCESSES" ]
enum_GoogleIamV1AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.config.logSource == enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].logType == enum_GoogleIamV1AuditLogConfigLogType[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].service == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.description == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.expression == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.location == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.title == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].members[_] == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].role == STRING
    input.Body.config.policyOverlay.STRING.etag == STRING
    input.Body.config.policyOverlay.STRING.version == INTEGER
    input.ReqMap.parent == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.results.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}