VMWAREENGINE

vmwareengine.projects.locations.dnsBindPermission.grant

valid {
    input.Body.principal.serviceAccount == STRING
    input.Body.principal.user == STRING
    input.Body.requestId == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.dnsBindPermission.revoke

valid {
    input.Body.principal.serviceAccount == STRING
    input.Body.principal.user == STRING
    input.Body.requestId == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.getDnsBindPermission

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPeerings.create

enum_NetworkPeeringPeerNetworkType := [ "PEER_NETWORK_TYPE_UNSPECIFIED", "STANDARD", "VMWARE_ENGINE_NETWORK", "PRIVATE_SERVICES_ACCESS", "NETAPP_CLOUD_VOLUMES", "THIRD_PARTY_SERVICE", "DELL_POWERSCALE" ]

valid {
    input.Body.description == STRING
    input.Body.exchangeSubnetRoutes == BOOLEAN
    input.Body.exportCustomRoutes == BOOLEAN
    input.Body.exportCustomRoutesWithPublicIp == BOOLEAN
    input.Body.importCustomRoutes == BOOLEAN
    input.Body.importCustomRoutesWithPublicIp == BOOLEAN
    input.Body.peerMtu == INTEGER
    input.Body.peerNetwork == STRING
    input.Body.peerNetworkType == enum_NetworkPeeringPeerNetworkType[_]
    input.Body.vmwareEngineNetwork == STRING
    input.ReqMap.parent == STRING
    input.Qs.networkPeeringId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPeerings.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPeerings.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPeerings.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPeerings.patch

enum_NetworkPeeringPeerNetworkType := [ "PEER_NETWORK_TYPE_UNSPECIFIED", "STANDARD", "VMWARE_ENGINE_NETWORK", "PRIVATE_SERVICES_ACCESS", "NETAPP_CLOUD_VOLUMES", "THIRD_PARTY_SERVICE", "DELL_POWERSCALE" ]

valid {
    input.Body.description == STRING
    input.Body.exchangeSubnetRoutes == BOOLEAN
    input.Body.exportCustomRoutes == BOOLEAN
    input.Body.exportCustomRoutesWithPublicIp == BOOLEAN
    input.Body.importCustomRoutes == BOOLEAN
    input.Body.importCustomRoutesWithPublicIp == BOOLEAN
    input.Body.peerMtu == INTEGER
    input.Body.peerNetwork == STRING
    input.Body.peerNetworkType == enum_NetworkPeeringPeerNetworkType[_]
    input.Body.vmwareEngineNetwork == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPeerings.peeringRoutes.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.create

valid {
    input.Body.description == STRING
    input.Body.edgeServicesCidr == STRING
    input.Body.externalIp.enabled == BOOLEAN
    input.Body.internetAccess.enabled == BOOLEAN
    input.Body.vmwareEngineNetwork == STRING
    input.ReqMap.parent == STRING
    input.Qs.networkPolicyId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.externalAccessRules.create

enum_ExternalAccessRuleAction := [ "ACTION_UNSPECIFIED", "ALLOW", "DENY" ]

valid {
    input.Body.action == enum_ExternalAccessRuleAction[_]
    input.Body.description == STRING
    input.Body.destinationIpRanges[_].externalAddress == STRING
    input.Body.destinationIpRanges[_].ipAddress == STRING
    input.Body.destinationIpRanges[_].ipAddressRange == STRING
    input.Body.destinationPorts[_] == STRING
    input.Body.ipProtocol == STRING
    input.Body.priority == INTEGER
    input.Body.sourceIpRanges[_].externalAddress == STRING
    input.Body.sourceIpRanges[_].ipAddress == STRING
    input.Body.sourceIpRanges[_].ipAddressRange == STRING
    input.Body.sourcePorts[_] == STRING
    input.ReqMap.parent == STRING
    input.Qs.externalAccessRuleId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.externalAccessRules.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.externalAccessRules.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.externalAccessRules.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.externalAccessRules.patch

enum_ExternalAccessRuleAction := [ "ACTION_UNSPECIFIED", "ALLOW", "DENY" ]

valid {
    input.Body.action == enum_ExternalAccessRuleAction[_]
    input.Body.description == STRING
    input.Body.destinationIpRanges[_].externalAddress == STRING
    input.Body.destinationIpRanges[_].ipAddress == STRING
    input.Body.destinationIpRanges[_].ipAddressRange == STRING
    input.Body.destinationPorts[_] == STRING
    input.Body.ipProtocol == STRING
    input.Body.priority == INTEGER
    input.Body.sourceIpRanges[_].externalAddress == STRING
    input.Body.sourceIpRanges[_].ipAddress == STRING
    input.Body.sourceIpRanges[_].ipAddressRange == STRING
    input.Body.sourcePorts[_] == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.fetchExternalAddresses

valid {
    input.ReqMap.networkPolicy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.networkPolicies.patch

valid {
    input.Body.description == STRING
    input.Body.edgeServicesCidr == STRING
    input.Body.externalIp.enabled == BOOLEAN
    input.Body.internetAccess.enabled == BOOLEAN
    input.Body.vmwareEngineNetwork == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.nodeTypes.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.nodeTypes.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.operations.delete

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.operations.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.operations.list

valid {
    input.ReqMap.name == STRING
    input.Qs.filter == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.create

valid {
    input.Body.nodeTypeConfigs.STRING.customCoreCount == INTEGER
    input.Body.nodeTypeConfigs.STRING.nodeCount == INTEGER
    input.Body.stretchedClusterConfig.preferredLocation == STRING
    input.Body.stretchedClusterConfig.secondaryLocation == STRING
    input.ReqMap.parent == STRING
    input.Qs.clusterId == STRING
    input.Qs.requestId == STRING
    input.Qs.validateOnly == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.nodes.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.nodes.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.patch

valid {
    input.Body.nodeTypeConfigs.STRING.customCoreCount == INTEGER
    input.Body.nodeTypeConfigs.STRING.nodeCount == INTEGER
    input.Body.stretchedClusterConfig.preferredLocation == STRING
    input.Body.stretchedClusterConfig.secondaryLocation == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.Qs.validateOnly == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.clusters.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.create

enum_PrivateCloudType := [ "STANDARD", "TIME_LIMITED", "STRETCHED" ]

valid {
    input.Body.description == STRING
    input.Body.managementCluster.clusterId == STRING
    input.Body.managementCluster.nodeTypeConfigs.STRING.customCoreCount == INTEGER
    input.Body.managementCluster.nodeTypeConfigs.STRING.nodeCount == INTEGER
    input.Body.managementCluster.stretchedClusterConfig.preferredLocation == STRING
    input.Body.managementCluster.stretchedClusterConfig.secondaryLocation == STRING
    input.Body.networkConfig.managementCidr == STRING
    input.Body.networkConfig.vmwareEngineNetwork == STRING
    input.Body.type == enum_PrivateCloudType[_]
    input.ReqMap.parent == STRING
    input.Qs.privateCloudId == STRING
    input.Qs.requestId == STRING
    input.Qs.validateOnly == BOOLEAN
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.delayHours == INTEGER
    input.Qs.force == BOOLEAN
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.externalAddresses.create

valid {
    input.Body.description == STRING
    input.Body.internalIp == STRING
    input.ReqMap.parent == STRING
    input.Qs.externalAddressId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.externalAddresses.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.externalAddresses.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.externalAddresses.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.externalAddresses.patch

valid {
    input.Body.description == STRING
    input.Body.internalIp == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.getDnsForwarding

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.hcxActivationKeys.create

valid {
    input.ReqMap.parent == STRING
    input.Qs.hcxActivationKeyId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.hcxActivationKeys.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.hcxActivationKeys.getIamPolicy

valid {
    input.ReqMap.resource == STRING
    input.Qs.options.requestedPolicyVersion == INTEGER
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.hcxActivationKeys.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.hcxActivationKeys.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.hcxActivationKeys.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.loggingServers.create

enum_LoggingServerProtocol := [ "PROTOCOL_UNSPECIFIED", "UDP", "TCP", "TLS", "SSL", "RELP" ]
enum_LoggingServerSourceType := [ "SOURCE_TYPE_UNSPECIFIED", "ESXI", "VCSA" ]

valid {
    input.Body.hostname == STRING
    input.Body.port == INTEGER
    input.Body.protocol == enum_LoggingServerProtocol[_]
    input.Body.sourceType == enum_LoggingServerSourceType[_]
    input.ReqMap.parent == STRING
    input.Qs.loggingServerId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.loggingServers.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.loggingServers.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.loggingServers.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.loggingServers.patch

enum_LoggingServerProtocol := [ "PROTOCOL_UNSPECIFIED", "UDP", "TCP", "TLS", "SSL", "RELP" ]
enum_LoggingServerSourceType := [ "SOURCE_TYPE_UNSPECIFIED", "ESXI", "VCSA" ]

valid {
    input.Body.hostname == STRING
    input.Body.port == INTEGER
    input.Body.protocol == enum_LoggingServerProtocol[_]
    input.Body.sourceType == enum_LoggingServerSourceType[_]
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.create

valid {
    input.Body.description == STRING
    input.Body.vmwareEngineNetwork == STRING
    input.Body.vpcNetwork == STRING
    input.ReqMap.parent == STRING
    input.Qs.managementDnsZoneBindingId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.patch

valid {
    input.Body.description == STRING
    input.Body.vmwareEngineNetwork == STRING
    input.Body.vpcNetwork == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.repair

valid {
    input.Body.requestId == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.patch

enum_PrivateCloudType := [ "STANDARD", "TIME_LIMITED", "STRETCHED" ]

valid {
    input.Body.description == STRING
    input.Body.managementCluster.clusterId == STRING
    input.Body.managementCluster.nodeTypeConfigs.STRING.customCoreCount == INTEGER
    input.Body.managementCluster.nodeTypeConfigs.STRING.nodeCount == INTEGER
    input.Body.managementCluster.stretchedClusterConfig.preferredLocation == STRING
    input.Body.managementCluster.stretchedClusterConfig.secondaryLocation == STRING
    input.Body.networkConfig.managementCidr == STRING
    input.Body.networkConfig.vmwareEngineNetwork == STRING
    input.Body.type == enum_PrivateCloudType[_]
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.resetNsxCredentials

valid {
    input.Body.requestId == STRING
    input.ReqMap.privateCloud == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.resetVcenterCredentials

valid {
    input.Body.requestId == STRING
    input.Body.username == STRING
    input.ReqMap.privateCloud == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.setIamPolicy

enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]

valid {
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
    input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
    input.Body.policy.auditConfigs[_].service == STRING
    input.Body.policy.bindings[_].condition.description == STRING
    input.Body.policy.bindings[_].condition.expression == STRING
    input.Body.policy.bindings[_].condition.location == STRING
    input.Body.policy.bindings[_].condition.title == STRING
    input.Body.policy.bindings[_].members[_] == STRING
    input.Body.policy.bindings[_].role == STRING
    input.Body.policy.etag == STRING
    input.Body.policy.version == INTEGER
    input.Body.updateMask == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.showNsxCredentials

valid {
    input.ReqMap.privateCloud == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.showVcenterCredentials

valid {
    input.ReqMap.privateCloud == STRING
    input.Qs.username == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.subnets.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.subnets.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.subnets.patch

valid {
    input.Body.gatewayIp == STRING
    input.Body.ipCidrRange == STRING
    input.ReqMap.name == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.testIamPermissions

valid {
    input.Body.permissions[_] == STRING
    input.ReqMap.resource == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.undelete

valid {
    input.Body.requestId == STRING
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateClouds.updateDnsForwarding

valid {
    input.Body.forwardingRules[_].domain == STRING
    input.Body.forwardingRules[_].nameServers[_] == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateConnections.create

enum_PrivateConnectionRoutingMode := [ "ROUTING_MODE_UNSPECIFIED", "GLOBAL", "REGIONAL" ]
enum_PrivateConnectionType := [ "TYPE_UNSPECIFIED", "PRIVATE_SERVICE_ACCESS", "NETAPP_CLOUD_VOLUMES", "DELL_POWERSCALE", "THIRD_PARTY_SERVICE" ]

valid {
    input.Body.description == STRING
    input.Body.routingMode == enum_PrivateConnectionRoutingMode[_]
    input.Body.serviceNetwork == STRING
    input.Body.type == enum_PrivateConnectionType[_]
    input.Body.vmwareEngineNetwork == STRING
    input.ReqMap.parent == STRING
    input.Qs.privateConnectionId == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateConnections.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateConnections.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateConnections.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateConnections.patch

enum_PrivateConnectionRoutingMode := [ "ROUTING_MODE_UNSPECIFIED", "GLOBAL", "REGIONAL" ]
enum_PrivateConnectionType := [ "TYPE_UNSPECIFIED", "PRIVATE_SERVICE_ACCESS", "NETAPP_CLOUD_VOLUMES", "DELL_POWERSCALE", "THIRD_PARTY_SERVICE" ]

valid {
    input.Body.description == STRING
    input.Body.routingMode == enum_PrivateConnectionRoutingMode[_]
    input.Body.serviceNetwork == STRING
    input.Body.type == enum_PrivateConnectionType[_]
    input.Body.vmwareEngineNetwork == STRING
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.privateConnections.peeringRoutes.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.vmwareEngineNetworks.create

enum_VmwareEngineNetworkType := [ "TYPE_UNSPECIFIED", "LEGACY", "STANDARD" ]

valid {
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.type == enum_VmwareEngineNetworkType[_]
    input.ReqMap.parent == STRING
    input.Qs.requestId == STRING
    input.Qs.vmwareEngineNetworkId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.vmwareEngineNetworks.delete

valid {
    input.ReqMap.name == STRING
    input.Qs.etag == STRING
    input.Qs.requestId == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.vmwareEngineNetworks.get

valid {
    input.ReqMap.name == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.vmwareEngineNetworks.list

valid {
    input.ReqMap.parent == STRING
    input.Qs.filter == STRING
    input.Qs.orderBy == STRING
    input.Qs.pageSize == INTEGER
    input.Qs.pageToken == STRING
    input.ProviderMetadata.Region == STRING
}

vmwareengine.projects.locations.vmwareEngineNetworks.patch

enum_VmwareEngineNetworkType := [ "TYPE_UNSPECIFIED", "LEGACY", "STANDARD" ]

valid {
    input.Body.description == STRING
    input.Body.etag == STRING
    input.Body.type == enum_VmwareEngineNetworkType[_]
    input.ReqMap.name == STRING
    input.Qs.requestId == STRING
    input.Qs.updateMask == STRING
    input.ProviderMetadata.Region == STRING
}