VMWAREENGINE
vmwareengine.projects.locations.dnsBindPermission.grant
valid {
input.Body.principal.serviceAccount == STRING
input.Body.principal.user == STRING
input.Body.requestId == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.dnsBindPermission.revoke
valid {
input.Body.principal.serviceAccount == STRING
input.Body.principal.user == STRING
input.Body.requestId == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.getDnsBindPermission
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPeerings.create
enum_NetworkPeeringPeerNetworkType := [ "PEER_NETWORK_TYPE_UNSPECIFIED", "STANDARD", "VMWARE_ENGINE_NETWORK", "PRIVATE_SERVICES_ACCESS", "NETAPP_CLOUD_VOLUMES", "THIRD_PARTY_SERVICE", "DELL_POWERSCALE", "GOOGLE_CLOUD_NETAPP_VOLUMES" ]
valid {
input.Body.description == STRING
input.Body.exchangeSubnetRoutes == BOOLEAN
input.Body.exportCustomRoutes == BOOLEAN
input.Body.exportCustomRoutesWithPublicIp == BOOLEAN
input.Body.importCustomRoutes == BOOLEAN
input.Body.importCustomRoutesWithPublicIp == BOOLEAN
input.Body.peerMtu == INTEGER
input.Body.peerNetwork == STRING
input.Body.peerNetworkType == enum_NetworkPeeringPeerNetworkType[_]
input.Body.vmwareEngineNetwork == STRING
input.ReqMap.parent == STRING
input.Qs.networkPeeringId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPeerings.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPeerings.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPeerings.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPeerings.patch
enum_NetworkPeeringPeerNetworkType := [ "PEER_NETWORK_TYPE_UNSPECIFIED", "STANDARD", "VMWARE_ENGINE_NETWORK", "PRIVATE_SERVICES_ACCESS", "NETAPP_CLOUD_VOLUMES", "THIRD_PARTY_SERVICE", "DELL_POWERSCALE", "GOOGLE_CLOUD_NETAPP_VOLUMES" ]
valid {
input.Body.description == STRING
input.Body.exchangeSubnetRoutes == BOOLEAN
input.Body.exportCustomRoutes == BOOLEAN
input.Body.exportCustomRoutesWithPublicIp == BOOLEAN
input.Body.importCustomRoutes == BOOLEAN
input.Body.importCustomRoutesWithPublicIp == BOOLEAN
input.Body.peerMtu == INTEGER
input.Body.peerNetwork == STRING
input.Body.peerNetworkType == enum_NetworkPeeringPeerNetworkType[_]
input.Body.vmwareEngineNetwork == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPeerings.peeringRoutes.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.create
valid {
input.Body.description == STRING
input.Body.edgeServicesCidr == STRING
input.Body.externalIp.enabled == BOOLEAN
input.Body.internetAccess.enabled == BOOLEAN
input.Body.vmwareEngineNetwork == STRING
input.ReqMap.parent == STRING
input.Qs.networkPolicyId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.externalAccessRules.create
enum_ExternalAccessRuleAction := [ "ACTION_UNSPECIFIED", "ALLOW", "DENY" ]
valid {
input.Body.action == enum_ExternalAccessRuleAction[_]
input.Body.description == STRING
input.Body.destinationIpRanges[_].externalAddress == STRING
input.Body.destinationIpRanges[_].ipAddress == STRING
input.Body.destinationIpRanges[_].ipAddressRange == STRING
input.Body.destinationPorts[_] == STRING
input.Body.ipProtocol == STRING
input.Body.priority == INTEGER
input.Body.sourceIpRanges[_].externalAddress == STRING
input.Body.sourceIpRanges[_].ipAddress == STRING
input.Body.sourceIpRanges[_].ipAddressRange == STRING
input.Body.sourcePorts[_] == STRING
input.ReqMap.parent == STRING
input.Qs.externalAccessRuleId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.externalAccessRules.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.externalAccessRules.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.externalAccessRules.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.externalAccessRules.patch
enum_ExternalAccessRuleAction := [ "ACTION_UNSPECIFIED", "ALLOW", "DENY" ]
valid {
input.Body.action == enum_ExternalAccessRuleAction[_]
input.Body.description == STRING
input.Body.destinationIpRanges[_].externalAddress == STRING
input.Body.destinationIpRanges[_].ipAddress == STRING
input.Body.destinationIpRanges[_].ipAddressRange == STRING
input.Body.destinationPorts[_] == STRING
input.Body.ipProtocol == STRING
input.Body.priority == INTEGER
input.Body.sourceIpRanges[_].externalAddress == STRING
input.Body.sourceIpRanges[_].ipAddress == STRING
input.Body.sourceIpRanges[_].ipAddressRange == STRING
input.Body.sourcePorts[_] == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.fetchExternalAddresses
valid {
input.ReqMap.networkPolicy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.networkPolicies.patch
valid {
input.Body.description == STRING
input.Body.edgeServicesCidr == STRING
input.Body.externalIp.enabled == BOOLEAN
input.Body.internetAccess.enabled == BOOLEAN
input.Body.vmwareEngineNetwork == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.nodeTypes.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.nodeTypes.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.operations.delete
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.operations.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.operations.list
valid {
input.ReqMap.name == STRING
input.Qs.filter == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.create
valid {
input.Body.autoscalingSettings.autoscalingPolicies.STRING.consumedMemoryThresholds.scaleIn == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.consumedMemoryThresholds.scaleOut == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.cpuThresholds.scaleIn == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.cpuThresholds.scaleOut == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.grantedMemoryThresholds.scaleIn == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.grantedMemoryThresholds.scaleOut == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.nodeTypeId == STRING
input.Body.autoscalingSettings.autoscalingPolicies.STRING.scaleOutSize == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.storageThresholds.scaleIn == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.storageThresholds.scaleOut == INTEGER
input.Body.autoscalingSettings.coolDownPeriod == STRING
input.Body.autoscalingSettings.maxClusterNodeCount == INTEGER
input.Body.autoscalingSettings.minClusterNodeCount == INTEGER
input.Body.nodeTypeConfigs.STRING.customCoreCount == INTEGER
input.Body.nodeTypeConfigs.STRING.nodeCount == INTEGER
input.Body.stretchedClusterConfig.preferredLocation == STRING
input.Body.stretchedClusterConfig.secondaryLocation == STRING
input.ReqMap.parent == STRING
input.Qs.clusterId == STRING
input.Qs.requestId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.nodes.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.nodes.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.patch
valid {
input.Body.autoscalingSettings.autoscalingPolicies.STRING.consumedMemoryThresholds.scaleIn == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.consumedMemoryThresholds.scaleOut == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.cpuThresholds.scaleIn == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.cpuThresholds.scaleOut == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.grantedMemoryThresholds.scaleIn == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.grantedMemoryThresholds.scaleOut == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.nodeTypeId == STRING
input.Body.autoscalingSettings.autoscalingPolicies.STRING.scaleOutSize == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.storageThresholds.scaleIn == INTEGER
input.Body.autoscalingSettings.autoscalingPolicies.STRING.storageThresholds.scaleOut == INTEGER
input.Body.autoscalingSettings.coolDownPeriod == STRING
input.Body.autoscalingSettings.maxClusterNodeCount == INTEGER
input.Body.autoscalingSettings.minClusterNodeCount == INTEGER
input.Body.nodeTypeConfigs.STRING.customCoreCount == INTEGER
input.Body.nodeTypeConfigs.STRING.nodeCount == INTEGER
input.Body.stretchedClusterConfig.preferredLocation == STRING
input.Body.stretchedClusterConfig.secondaryLocation == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.clusters.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.create
enum_PrivateCloudType := [ "STANDARD", "TIME_LIMITED", "STRETCHED" ]
valid {
input.Body.description == STRING
input.Body.managementCluster.clusterId == STRING
input.Body.managementCluster.nodeTypeConfigs.STRING.customCoreCount == INTEGER
input.Body.managementCluster.nodeTypeConfigs.STRING.nodeCount == INTEGER
input.Body.managementCluster.stretchedClusterConfig.preferredLocation == STRING
input.Body.managementCluster.stretchedClusterConfig.secondaryLocation == STRING
input.Body.networkConfig.managementCidr == STRING
input.Body.networkConfig.vmwareEngineNetwork == STRING
input.Body.type == enum_PrivateCloudType[_]
input.ReqMap.parent == STRING
input.Qs.privateCloudId == STRING
input.Qs.requestId == STRING
input.Qs.validateOnly == BOOLEAN
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.delete
valid {
input.ReqMap.name == STRING
input.Qs.delayHours == INTEGER
input.Qs.force == BOOLEAN
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.externalAddresses.create
valid {
input.Body.description == STRING
input.Body.internalIp == STRING
input.ReqMap.parent == STRING
input.Qs.externalAddressId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.externalAddresses.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.externalAddresses.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.externalAddresses.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.externalAddresses.patch
valid {
input.Body.description == STRING
input.Body.internalIp == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.getDnsForwarding
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.hcxActivationKeys.create
valid {
input.ReqMap.parent == STRING
input.Qs.hcxActivationKeyId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.hcxActivationKeys.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.hcxActivationKeys.getIamPolicy
valid {
input.ReqMap.resource == STRING
input.Qs.options.requestedPolicyVersion == INTEGER
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.hcxActivationKeys.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.hcxActivationKeys.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.hcxActivationKeys.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.loggingServers.create
enum_LoggingServerProtocol := [ "PROTOCOL_UNSPECIFIED", "UDP", "TCP", "TLS", "SSL", "RELP" ]
enum_LoggingServerSourceType := [ "SOURCE_TYPE_UNSPECIFIED", "ESXI", "VCSA" ]
valid {
input.Body.hostname == STRING
input.Body.port == INTEGER
input.Body.protocol == enum_LoggingServerProtocol[_]
input.Body.sourceType == enum_LoggingServerSourceType[_]
input.ReqMap.parent == STRING
input.Qs.loggingServerId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.loggingServers.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.loggingServers.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.loggingServers.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.loggingServers.patch
enum_LoggingServerProtocol := [ "PROTOCOL_UNSPECIFIED", "UDP", "TCP", "TLS", "SSL", "RELP" ]
enum_LoggingServerSourceType := [ "SOURCE_TYPE_UNSPECIFIED", "ESXI", "VCSA" ]
valid {
input.Body.hostname == STRING
input.Body.port == INTEGER
input.Body.protocol == enum_LoggingServerProtocol[_]
input.Body.sourceType == enum_LoggingServerSourceType[_]
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.create
valid {
input.Body.description == STRING
input.Body.vmwareEngineNetwork == STRING
input.Body.vpcNetwork == STRING
input.ReqMap.parent == STRING
input.Qs.managementDnsZoneBindingId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.patch
valid {
input.Body.description == STRING
input.Body.vmwareEngineNetwork == STRING
input.Body.vpcNetwork == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.managementDnsZoneBindings.repair
valid {
input.Body.requestId == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.patch
enum_PrivateCloudType := [ "STANDARD", "TIME_LIMITED", "STRETCHED" ]
valid {
input.Body.description == STRING
input.Body.managementCluster.clusterId == STRING
input.Body.managementCluster.nodeTypeConfigs.STRING.customCoreCount == INTEGER
input.Body.managementCluster.nodeTypeConfigs.STRING.nodeCount == INTEGER
input.Body.managementCluster.stretchedClusterConfig.preferredLocation == STRING
input.Body.managementCluster.stretchedClusterConfig.secondaryLocation == STRING
input.Body.networkConfig.managementCidr == STRING
input.Body.networkConfig.vmwareEngineNetwork == STRING
input.Body.type == enum_PrivateCloudType[_]
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.resetNsxCredentials
valid {
input.Body.requestId == STRING
input.ReqMap.privateCloud == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.resetVcenterCredentials
valid {
input.Body.requestId == STRING
input.Body.username == STRING
input.ReqMap.privateCloud == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.setIamPolicy
enum_AuditLogConfigLogType := [ "LOG_TYPE_UNSPECIFIED", "ADMIN_READ", "DATA_WRITE", "DATA_READ" ]
valid {
input.Body.policy.auditConfigs[_].auditLogConfigs[_].exemptedMembers[_] == STRING
input.Body.policy.auditConfigs[_].auditLogConfigs[_].logType == enum_AuditLogConfigLogType[_]
input.Body.policy.auditConfigs[_].service == STRING
input.Body.policy.bindings[_].condition.description == STRING
input.Body.policy.bindings[_].condition.expression == STRING
input.Body.policy.bindings[_].condition.location == STRING
input.Body.policy.bindings[_].condition.title == STRING
input.Body.policy.bindings[_].members[_] == STRING
input.Body.policy.bindings[_].role == STRING
input.Body.policy.etag == STRING
input.Body.policy.version == INTEGER
input.Body.updateMask == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.showNsxCredentials
valid {
input.ReqMap.privateCloud == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.showVcenterCredentials
valid {
input.ReqMap.privateCloud == STRING
input.Qs.username == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.subnets.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.subnets.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.subnets.patch
valid {
input.Body.gatewayIp == STRING
input.Body.ipCidrRange == STRING
input.ReqMap.name == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.testIamPermissions
valid {
input.Body.permissions[_] == STRING
input.ReqMap.resource == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.undelete
valid {
input.Body.requestId == STRING
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateClouds.updateDnsForwarding
valid {
input.Body.forwardingRules[_].domain == STRING
input.Body.forwardingRules[_].nameServers[_] == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateConnections.create
enum_PrivateConnectionRoutingMode := [ "ROUTING_MODE_UNSPECIFIED", "GLOBAL", "REGIONAL" ]
enum_PrivateConnectionType := [ "TYPE_UNSPECIFIED", "PRIVATE_SERVICE_ACCESS", "NETAPP_CLOUD_VOLUMES", "DELL_POWERSCALE", "THIRD_PARTY_SERVICE" ]
valid {
input.Body.description == STRING
input.Body.routingMode == enum_PrivateConnectionRoutingMode[_]
input.Body.serviceNetwork == STRING
input.Body.type == enum_PrivateConnectionType[_]
input.Body.vmwareEngineNetwork == STRING
input.ReqMap.parent == STRING
input.Qs.privateConnectionId == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateConnections.delete
valid {
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateConnections.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateConnections.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateConnections.patch
enum_PrivateConnectionRoutingMode := [ "ROUTING_MODE_UNSPECIFIED", "GLOBAL", "REGIONAL" ]
enum_PrivateConnectionType := [ "TYPE_UNSPECIFIED", "PRIVATE_SERVICE_ACCESS", "NETAPP_CLOUD_VOLUMES", "DELL_POWERSCALE", "THIRD_PARTY_SERVICE" ]
valid {
input.Body.description == STRING
input.Body.routingMode == enum_PrivateConnectionRoutingMode[_]
input.Body.serviceNetwork == STRING
input.Body.type == enum_PrivateConnectionType[_]
input.Body.vmwareEngineNetwork == STRING
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.privateConnections.peeringRoutes.list
valid {
input.ReqMap.parent == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.vmwareEngineNetworks.create
enum_VmwareEngineNetworkType := [ "TYPE_UNSPECIFIED", "LEGACY", "STANDARD" ]
valid {
input.Body.description == STRING
input.Body.etag == STRING
input.Body.type == enum_VmwareEngineNetworkType[_]
input.ReqMap.parent == STRING
input.Qs.requestId == STRING
input.Qs.vmwareEngineNetworkId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.vmwareEngineNetworks.delete
valid {
input.ReqMap.name == STRING
input.Qs.etag == STRING
input.Qs.requestId == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.vmwareEngineNetworks.get
valid {
input.ReqMap.name == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.vmwareEngineNetworks.list
valid {
input.ReqMap.parent == STRING
input.Qs.filter == STRING
input.Qs.orderBy == STRING
input.Qs.pageSize == INTEGER
input.Qs.pageToken == STRING
input.ProviderMetadata.Region == STRING
}
vmwareengine.projects.locations.vmwareEngineNetworks.patch
enum_VmwareEngineNetworkType := [ "TYPE_UNSPECIFIED", "LEGACY", "STANDARD" ]
valid {
input.Body.description == STRING
input.Body.etag == STRING
input.Body.type == enum_VmwareEngineNetworkType[_]
input.ReqMap.name == STRING
input.Qs.requestId == STRING
input.Qs.updateMask == STRING
input.ProviderMetadata.Region == STRING
}
Updated about 1 month ago