POLICYSIMULATOR
policysimulator.folders.locations.orgPolicyViolationsPreviews.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.folders.locations.replays.create
enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource := [ "LOG_SOURCE_UNSPECIFIED", "RECENT_ACCESSES" ]
enum_GoogleIamV1AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.config.logSource == enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource[_]
input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].logType == enum_GoogleIamV1AuditLogConfigLogType[_]
input.Body.config.policyOverlay.STRING.auditConfigs[_].service == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.description == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.expression == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.location == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.title == STRING
input.Body.config.policyOverlay.STRING.bindings[_].members[_] == STRING
input.Body.config.policyOverlay.STRING.bindings[_].role == STRING
input.Body.config.policyOverlay.STRING.etag == STRING
input.Body.config.policyOverlay.STRING.version == INTEGER
input.ReqMap.parent == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.folders.locations.replays.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.folders.locations.replays.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.folders.locations.replays.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.folders.locations.replays.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.folders.locations.replays.results.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.orgPolicyViolationsPreviews.create
enum_GoogleCloudOrgpolicyV2CustomConstraintActionType := [ "ACTION_TYPE_UNSPECIFIED", "ALLOW", "DENY" ]
enum_GoogleCloudOrgpolicyV2CustomConstraintMethodTypes := [ "METHOD_TYPE_UNSPECIFIED", "CREATE", "UPDATE", "DELETE", "REMOVE_GRANT", "GOVERN_TAGS" ]
valid {
input.Body.overlay.customConstraints[_].customConstraint.actionType == enum_GoogleCloudOrgpolicyV2CustomConstraintActionType[_]
input.Body.overlay.customConstraints[_].customConstraint.condition == STRING
input.Body.overlay.customConstraints[_].customConstraint.description == STRING
input.Body.overlay.customConstraints[_].customConstraint.displayName == STRING
input.Body.overlay.customConstraints[_].customConstraint.methodTypes[_] == enum_GoogleCloudOrgpolicyV2CustomConstraintMethodTypes[_]
input.Body.overlay.customConstraints[_].customConstraint.name == STRING
input.Body.overlay.customConstraints[_].customConstraint.resourceTypes[_] == STRING
input.Body.overlay.customConstraints[_].customConstraintParent == STRING
input.Body.overlay.policies[_].policy.alternate.launch == STRING
input.Body.overlay.policies[_].policy.alternate.spec.etag == STRING
input.Body.overlay.policies[_].policy.alternate.spec.inheritFromParent == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.reset == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].allowAll == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.description == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.expression == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.location == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.title == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].denyAll == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].enforce == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].values.allowedValues[_] == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].values.deniedValues[_] == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.etag == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.inheritFromParent == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.reset == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].allowAll == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.description == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.expression == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.location == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.title == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].denyAll == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].enforce == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].values.allowedValues[_] == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].values.deniedValues[_] == STRING
input.Body.overlay.policies[_].policy.etag == STRING
input.Body.overlay.policies[_].policy.name == STRING
input.Body.overlay.policies[_].policy.spec.etag == STRING
input.Body.overlay.policies[_].policy.spec.inheritFromParent == BOOLEAN
input.Body.overlay.policies[_].policy.spec.reset == BOOLEAN
input.Body.overlay.policies[_].policy.spec.rules[_].allowAll == BOOLEAN
input.Body.overlay.policies[_].policy.spec.rules[_].condition.description == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].condition.expression == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].condition.location == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].condition.title == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].denyAll == BOOLEAN
input.Body.overlay.policies[_].policy.spec.rules[_].enforce == BOOLEAN
input.Body.overlay.policies[_].policy.spec.rules[_].values.allowedValues[_] == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].values.deniedValues[_] == STRING
input.Body.overlay.policies[_].policyParent == STRING
input.ReqMap.parent == STRING
input.Qs.orgPolicyViolationsPreviewId == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.orgPolicyViolationsPreviews.generate
enum_GoogleCloudOrgpolicyV2CustomConstraintActionType := [ "ACTION_TYPE_UNSPECIFIED", "ALLOW", "DENY" ]
enum_GoogleCloudOrgpolicyV2CustomConstraintMethodTypes := [ "METHOD_TYPE_UNSPECIFIED", "CREATE", "UPDATE", "DELETE", "REMOVE_GRANT", "GOVERN_TAGS" ]
valid {
input.Body.overlay.customConstraints[_].customConstraint.actionType == enum_GoogleCloudOrgpolicyV2CustomConstraintActionType[_]
input.Body.overlay.customConstraints[_].customConstraint.condition == STRING
input.Body.overlay.customConstraints[_].customConstraint.description == STRING
input.Body.overlay.customConstraints[_].customConstraint.displayName == STRING
input.Body.overlay.customConstraints[_].customConstraint.methodTypes[_] == enum_GoogleCloudOrgpolicyV2CustomConstraintMethodTypes[_]
input.Body.overlay.customConstraints[_].customConstraint.name == STRING
input.Body.overlay.customConstraints[_].customConstraint.resourceTypes[_] == STRING
input.Body.overlay.customConstraints[_].customConstraintParent == STRING
input.Body.overlay.policies[_].policy.alternate.launch == STRING
input.Body.overlay.policies[_].policy.alternate.spec.etag == STRING
input.Body.overlay.policies[_].policy.alternate.spec.inheritFromParent == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.reset == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].allowAll == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.description == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.expression == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.location == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.title == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].denyAll == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].enforce == BOOLEAN
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].values.allowedValues[_] == STRING
input.Body.overlay.policies[_].policy.alternate.spec.rules[_].values.deniedValues[_] == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.etag == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.inheritFromParent == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.reset == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].allowAll == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.description == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.expression == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.location == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.title == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].denyAll == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].enforce == BOOLEAN
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].values.allowedValues[_] == STRING
input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].values.deniedValues[_] == STRING
input.Body.overlay.policies[_].policy.etag == STRING
input.Body.overlay.policies[_].policy.name == STRING
input.Body.overlay.policies[_].policy.spec.etag == STRING
input.Body.overlay.policies[_].policy.spec.inheritFromParent == BOOLEAN
input.Body.overlay.policies[_].policy.spec.reset == BOOLEAN
input.Body.overlay.policies[_].policy.spec.rules[_].allowAll == BOOLEAN
input.Body.overlay.policies[_].policy.spec.rules[_].condition.description == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].condition.expression == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].condition.location == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].condition.title == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].denyAll == BOOLEAN
input.Body.overlay.policies[_].policy.spec.rules[_].enforce == BOOLEAN
input.Body.overlay.policies[_].policy.spec.rules[_].values.allowedValues[_] == STRING
input.Body.overlay.policies[_].policy.spec.rules[_].values.deniedValues[_] == STRING
input.Body.overlay.policies[_].policyParent == STRING
input.ReqMap.parent == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.orgPolicyViolationsPreviews.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.orgPolicyViolationsPreviews.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.orgPolicyViolationsPreviews.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.orgPolicyViolationsPreviews.orgPolicyViolations.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.replays.create
enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource := [ "LOG_SOURCE_UNSPECIFIED", "RECENT_ACCESSES" ]
enum_GoogleIamV1AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.config.logSource == enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource[_]
input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].logType == enum_GoogleIamV1AuditLogConfigLogType[_]
input.Body.config.policyOverlay.STRING.auditConfigs[_].service == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.description == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.expression == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.location == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.title == STRING
input.Body.config.policyOverlay.STRING.bindings[_].members[_] == STRING
input.Body.config.policyOverlay.STRING.bindings[_].role == STRING
input.Body.config.policyOverlay.STRING.etag == STRING
input.Body.config.policyOverlay.STRING.version == INTEGER
input.ReqMap.parent == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.replays.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.replays.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.replays.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.replays.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.organizations.locations.replays.results.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.projects.locations.orgPolicyViolationsPreviews.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.projects.locations.replays.create
enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource := [ "LOG_SOURCE_UNSPECIFIED", "RECENT_ACCESSES" ]
enum_GoogleIamV1AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.config.logSource == enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource[_]
input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].logType == enum_GoogleIamV1AuditLogConfigLogType[_]
input.Body.config.policyOverlay.STRING.auditConfigs[_].service == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.description == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.expression == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.location == STRING
input.Body.config.policyOverlay.STRING.bindings[_].condition.title == STRING
input.Body.config.policyOverlay.STRING.bindings[_].members[_] == STRING
input.Body.config.policyOverlay.STRING.bindings[_].role == STRING
input.Body.config.policyOverlay.STRING.etag == STRING
input.Body.config.policyOverlay.STRING.version == INTEGER
input.ReqMap.parent == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.projects.locations.replays.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.projects.locations.replays.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.projects.locations.replays.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.projects.locations.replays.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
policysimulator.projects.locations.replays.results.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
Updated 1 day ago