POLICYSIMULATOR

policysimulator.folders.locations.orgPolicyViolationsPreviews.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.create

enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource := [ "LOG_SOURCE_UNSPECIFIED", "RECENT_ACCESSES" ]
enum_GoogleIamV1AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.config.logSource == enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].logType == enum_GoogleIamV1AuditLogConfigLogType[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].service == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.description == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.expression == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.location == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.title == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].members[_] == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].role == STRING
    input.Body.config.policyOverlay.STRING.etag == STRING
    input.Body.config.policyOverlay.STRING.version == INTEGER
    input.ReqMap.parent == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.folders.locations.replays.results.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.orgPolicyViolationsPreviews.create

enum_GoogleCloudOrgpolicyV2CustomConstraintActionType := [ "ACTION_TYPE_UNSPECIFIED", "ALLOW", "DENY" ]
enum_GoogleCloudOrgpolicyV2CustomConstraintMethodTypes := [ "METHOD_TYPE_UNSPECIFIED", "CREATE", "UPDATE", "DELETE", "REMOVE_GRANT", "GOVERN_TAGS" ]

valid {
    input.Body.overlay.customConstraints[_].customConstraint.actionType == enum_GoogleCloudOrgpolicyV2CustomConstraintActionType[_]
    input.Body.overlay.customConstraints[_].customConstraint.condition == STRING
    input.Body.overlay.customConstraints[_].customConstraint.description == STRING
    input.Body.overlay.customConstraints[_].customConstraint.displayName == STRING
    input.Body.overlay.customConstraints[_].customConstraint.methodTypes[_] == enum_GoogleCloudOrgpolicyV2CustomConstraintMethodTypes[_]
    input.Body.overlay.customConstraints[_].customConstraint.name == STRING
    input.Body.overlay.customConstraints[_].customConstraint.resourceTypes[_] == STRING
    input.Body.overlay.customConstraints[_].customConstraintParent == STRING
    input.Body.overlay.policies[_].policy.alternate.launch == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.etag == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.inheritFromParent == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.reset == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].allowAll == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.description == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.expression == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.location == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.title == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].denyAll == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].enforce == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].parameters.STRING == ANY
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].values.allowedValues[_] == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].values.deniedValues[_] == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.etag == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.inheritFromParent == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.reset == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].allowAll == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.description == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.expression == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.location == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.title == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].denyAll == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].enforce == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].parameters.STRING == ANY
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].values.allowedValues[_] == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].values.deniedValues[_] == STRING
    input.Body.overlay.policies[_].policy.etag == STRING
    input.Body.overlay.policies[_].policy.name == STRING
    input.Body.overlay.policies[_].policy.spec.etag == STRING
    input.Body.overlay.policies[_].policy.spec.inheritFromParent == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.reset == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.rules[_].allowAll == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.rules[_].condition.description == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].condition.expression == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].condition.location == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].condition.title == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].denyAll == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.rules[_].enforce == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.rules[_].parameters.STRING == ANY
    input.Body.overlay.policies[_].policy.spec.rules[_].values.allowedValues[_] == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].values.deniedValues[_] == STRING
    input.Body.overlay.policies[_].policyParent == STRING
    input.ReqMap.parent == STRING
    input.Qs.orgPolicyViolationsPreviewId == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.orgPolicyViolationsPreviews.generate

enum_GoogleCloudOrgpolicyV2CustomConstraintActionType := [ "ACTION_TYPE_UNSPECIFIED", "ALLOW", "DENY" ]
enum_GoogleCloudOrgpolicyV2CustomConstraintMethodTypes := [ "METHOD_TYPE_UNSPECIFIED", "CREATE", "UPDATE", "DELETE", "REMOVE_GRANT", "GOVERN_TAGS" ]

valid {
    input.Body.overlay.customConstraints[_].customConstraint.actionType == enum_GoogleCloudOrgpolicyV2CustomConstraintActionType[_]
    input.Body.overlay.customConstraints[_].customConstraint.condition == STRING
    input.Body.overlay.customConstraints[_].customConstraint.description == STRING
    input.Body.overlay.customConstraints[_].customConstraint.displayName == STRING
    input.Body.overlay.customConstraints[_].customConstraint.methodTypes[_] == enum_GoogleCloudOrgpolicyV2CustomConstraintMethodTypes[_]
    input.Body.overlay.customConstraints[_].customConstraint.name == STRING
    input.Body.overlay.customConstraints[_].customConstraint.resourceTypes[_] == STRING
    input.Body.overlay.customConstraints[_].customConstraintParent == STRING
    input.Body.overlay.policies[_].policy.alternate.launch == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.etag == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.inheritFromParent == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.reset == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].allowAll == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.description == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.expression == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.location == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].condition.title == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].denyAll == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].enforce == BOOLEAN
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].parameters.STRING == ANY
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].values.allowedValues[_] == STRING
    input.Body.overlay.policies[_].policy.alternate.spec.rules[_].values.deniedValues[_] == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.etag == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.inheritFromParent == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.reset == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].allowAll == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.description == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.expression == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.location == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].condition.title == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].denyAll == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].enforce == BOOLEAN
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].parameters.STRING == ANY
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].values.allowedValues[_] == STRING
    input.Body.overlay.policies[_].policy.dryRunSpec.rules[_].values.deniedValues[_] == STRING
    input.Body.overlay.policies[_].policy.etag == STRING
    input.Body.overlay.policies[_].policy.name == STRING
    input.Body.overlay.policies[_].policy.spec.etag == STRING
    input.Body.overlay.policies[_].policy.spec.inheritFromParent == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.reset == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.rules[_].allowAll == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.rules[_].condition.description == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].condition.expression == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].condition.location == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].condition.title == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].denyAll == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.rules[_].enforce == BOOLEAN
    input.Body.overlay.policies[_].policy.spec.rules[_].parameters.STRING == ANY
    input.Body.overlay.policies[_].policy.spec.rules[_].values.allowedValues[_] == STRING
    input.Body.overlay.policies[_].policy.spec.rules[_].values.deniedValues[_] == STRING
    input.Body.overlay.policies[_].policyParent == STRING
    input.ReqMap.parent == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.orgPolicyViolationsPreviews.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.orgPolicyViolationsPreviews.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.orgPolicyViolationsPreviews.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.orgPolicyViolationsPreviews.orgPolicyViolations.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.create

enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource := [ "LOG_SOURCE_UNSPECIFIED", "RECENT_ACCESSES" ]
enum_GoogleIamV1AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.config.logSource == enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].logType == enum_GoogleIamV1AuditLogConfigLogType[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].service == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.description == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.expression == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.location == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.title == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].members[_] == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].role == STRING
    input.Body.config.policyOverlay.STRING.etag == STRING
    input.Body.config.policyOverlay.STRING.version == INTEGER
    input.ReqMap.parent == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.organizations.locations.replays.results.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.orgPolicyViolationsPreviews.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.create

enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource := [ "LOG_SOURCE_UNSPECIFIED", "RECENT_ACCESSES" ]
enum_GoogleIamV1AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.config.logSource == enum_GoogleCloudPolicysimulatorV1ReplayConfigLogSource[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.config.policyOverlay.STRING.auditConfigs[_].auditLogConfigs[_].logType == enum_GoogleIamV1AuditLogConfigLogType[_]
    input.Body.config.policyOverlay.STRING.auditConfigs[_].service == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.description == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.expression == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.location == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].condition.title == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].members[_] == STRING
    input.Body.config.policyOverlay.STRING.bindings[_].role == STRING
    input.Body.config.policyOverlay.STRING.etag == STRING
    input.Body.config.policyOverlay.STRING.version == INTEGER
    input.ReqMap.parent == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

policysimulator.projects.locations.replays.results.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}