
    Ag                        S r SSKJr  SSKJr  SSKJr  Sr " S S\R                  5      r
 " S S	\R                  5      r " S
 S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r\R.                  " \S S!5        \R0                  " \R2                  S"S#5        \R0                  " \R2                  S$S%5        \R.                  " \S&S'5        \R.                  " \S(S)5        \R.                  " \S*S+5        \R.                  " \S,S-5        \R.                  " \S.S/5        \R.                  " \S0S15        \R.                  " \S2S35        \R.                  " \S4S55        \R.                  " \S6S75        \R.                  " \S8S95        \R.                  " \S:S;5        \R.                  " \S<S=5        g>)?zGenerated message classes for cloudasset version v1p4alpha1.

The cloud asset API manages the history and inventory of cloud resources.
    )absolute_import)messages)encoding
cloudassetc                       \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	\R                  " SS	SS9r
S
rg)AnalyzeIamPolicyResponse   a  A response message for AssetService.AnalyzeIamPolicy.

Fields:
  analysisResults: A list of IamPolicyAnalysisResult that matches the
    request, or empty if no result is found.
  fullyExplored: Represents whether all entries in the analysis_results have
    been fully explored to answer the query in the request.
  nonCriticalErrors: A list of non-critical errors happened during the
    request handling to explain why `fully_explored` is false, or empty if
    no error happened.
IamPolicyAnalysisResult   Trepeated   'GoogleCloudAssetV1p4alpha1AnalysisState    N)__name__
__module____qualname____firstlineno____doc__	_messagesMessageFieldanalysisResultsBooleanFieldfullyExplorednonCriticalErrors__static_attributes__r       alib/googlecloudsdk/generated_clients/apis/cloudasset/v1p4alpha1/cloudasset_v1p4alpha1_messages.pyr   r      sG    
 **+DaRVW/((+-,,-VXYdhir   r   c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " S5      r
S	rg
)Binding"   a	  Associates `members` with a `role`.

Fields:
  condition: The condition that is associated with this binding. NOTE: An
    unsatisfied condition will not allow user access via current binding.
    Different bindings, including their conditions, are examined
    independently.
  members: Specifies the identities requesting access for a Cloud Platform
    resource. `members` can have the following values:  * `allUsers`: A
    special identifier that represents anyone who is    on the internet;
    with or without a Google account.  * `allAuthenticatedUsers`: A special
    identifier that represents anyone    who is authenticated with a Google
    account or a service account.  * `user:{emailid}`: An email address that
    represents a specific Google    account. For example,
    `alice@example.com` .   * `serviceAccount:{emailid}`: An email address
    that represents a service    account. For example, `my-other-
    app@appspot.gserviceaccount.com`.  * `group:{emailid}`: An email address
    that represents a Google group.    For example, `admins@example.com`.  *
    `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
    identifier) representing a user that has been recently deleted. For
    example,`alice@example.com?uid=123456789012345678901`. If the user is
    recovered, this value reverts to `user:{emailid}` and the recovered user
    retains the role in the binding.  *
    `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address
    (plus    unique identifier) representing a service account that has been
    recently    deleted. For example,    `my-other-
    app@appspot.gserviceaccount.com?uid=123456789012345678901`.    If the
    service account is undeleted, this value reverts to
    `serviceAccount:{emailid}` and the undeleted service account retains the
    role in the binding.  * `deleted:group:{emailid}?uid={uniqueid}`: An
    email address (plus unique    identifier) representing a Google group
    that has been recently    deleted. For example,
    `admins@example.com?uid=123456789012345678901`. If    the group is
    recovered, this value reverts to `group:{emailid}` and the    recovered
    group retains the role in the binding.   * `domain:{domain}`: The G
    Suite domain (primary) that represents all the    users of that domain.
    For example, `google.com` or `example.com`.
  role: Role that is assigned to `members`. For example, `roles/viewer`,
    `roles/editor`, or `roles/owner`.
Exprr   r   Tr   r   r   N)r   r   r   r   r   r   r   	conditionStringFieldmembersroler   r   r   r   r!   r!   "   s>    'R $$VQ/)!!!d3'			q	!$r   r!   c                   2   \ rS rSrSr\R                  " SSS9r\R                  " SSS9r\R                  " S5      r	\R                  " S5      r\R                  " S	5      r\R                  " S
5      r\R                  " S\R                  R                   S9r\R                  " S\R                  R                   S9r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " SSS9r\R                  " S5      rSrg)!CloudassetAnalyzeIamPolicyRequestQ   a
  A CloudassetAnalyzeIamPolicyRequest object.

Fields:
  accessSelector_permissions: Optional. The permissions to appear in result.
  accessSelector_roles: Optional. The roles to appear in result.
  identitySelector_identity: Required. The identity appear in the form of
    members in [IAM policy
    binding](https://cloud.google.com/iam/reference/rest/v1/Binding).
  options_expandGroups: Optional. If true, the identities section of the
    result will expand any Google groups appearing in an IAM policy binding.
    If identity_selector is specified, the identity in the result will be
    determined by the selector, and this flag will have no effect.  Default
    is false.
  options_expandResources: Optional. If true, the resource section of the
    result will expand any resource attached to an IAM policy to include
    resources lower in the resource hierarchy.  For example, if the request
    analyzes for which resources user A has permission P, and the results
    include an IAM policy with P on a GCP folder, the results will also
    include resources in that folder with permission P.  If
    resource_selector is specified, the resource section of the result will
    be determined by the selector, and this flag will have no effect.
    Default is false.
  options_expandRoles: Optional. If true, the access section of result will
    expand any roles appearing in IAM policy bindings to include their
    permissions.  If access_selector is specified, the access section of the
    result will be determined by the selector, and this flag will have no
    effect.  Default is false.
  options_maxFanoutsPerGroup: Optional. The maximum number of fanouts per
    group when expand_groups is enabled.
  options_maxFanoutsPerResource: Optional. The maximum number of fanouts per
    parent resource, such as GCP Project etc., when expand_resources is
    enabled.
  options_outputGroupEdges: Optional. If true, the result will output group
    identity edges, starting from the binding's group members, to any
    expanded identities. Default is false.
  options_outputPartialResultBeforeTimeout: Optional. If true, you will get
    a response with partial result instead of a DEADLINE_EXCEEDED error when
    your request processing takes longer than the deadline.
  options_outputResourceEdges: Optional. If true, the result will output
    resource edges, starting from the policy attached resource, to any
    expanded resources. Default is false.
  parent: Required. The relative name of root asset to do analysis . This
    can only be an organization number (such as "organizations/123") for
    now.
  resourceSelector_fullResourceName: Required. The [full resource name](http
    s://cloud.google.com/apis/design/resource_names#full_resource_name) .
r   Tr   r   r               )variant   	   
         )required   r   N)r   r   r   r   r   r   r%   accessSelector_permissionsaccessSelector_rolesidentitySelector_identityr   options_expandGroupsoptions_expandResourcesoptions_expandRolesIntegerFieldVariantINT32options_maxFanoutsPerGroupoptions_maxFanoutsPerResourceoptions_outputGroupEdges(options_outputPartialResultBeforeTimeoutoptions_outputResourceEdgesparent!resourceSelector_fullResourceNamer   r   r   r   r)   r)   Q   s   .`  )44QF"..q4@'33A6"//2%2215!..q1(55aARARAXAXY"+"8"8IDUDUD[D["\&33A6-6-C-CB-G* ) 6 6r :  d3&&/&;&;B&?#r   r)   c                       \ rS rSrSr\R                  " S5      r\R                  " S5      r\R                  " S5      r	\R                  " S5      r
Srg)	r#      ab  Represents an expression text. Example:      title: "User account
presence"     description: "Determines whether the request has a user
account"     expression: "size(request.user) > 0"

Fields:
  description: An optional description of the expression. This is a longer
    text which describes the expression, e.g. when hovered over it in a UI.
  expression: Textual representation of an expression in Common Expression
    Language syntax.  The application context of the containing message
    determines which well-known feature set of CEL is supported.
  location: An optional string indicating the location of the expression for
    error reporting, e.g. a file name and a position in the file.
  title: An optional title for the expression, i.e. a short string
    describing its purpose. This can be used e.g. in UIs which allow to
    enter the expression.
r   r   r   r+   r   N)r   r   r   r   r   r   r%   description
expressionlocationtitler   r   r   r   r#   r#      sI    " %%a(+$$Q'*""1%(



"%r   r#   c                       \ rS rSrSr\R                  " SS5      r\R                  " S5      r	\R                  " S5      r
Srg)	 GoogleCloudAssetV1p4alpha1Access   zA role or permission that appears in an access control list.

Fields:
  analysisState: The analysis state of this access node.
  permission: The permission.
  role: The role.
r   r   r   r   r   N)r   r   r   r   r   r   r   analysisStater%   
permissionr'   r   r   r   r   rN   rN      s=     (()RTUV-$$Q'*			q	!$r   rN   c                       \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	\R                  " SS	SS9r
\R                  " S
SSS9rSrg)+GoogleCloudAssetV1p4alpha1AccessControlList   a  An access control list, derived from the above IAM policy binding, which
contains a set of resources and accesses. May include one item from each set
to compose an access control entry.  NOTICE that there could be multiple
access control lists for one IAM policy binding. The access control lists
are created per resource type.  For example, assume we have the following
cases in one IAM policy binding: - Permission P1 and P2 apply to resource R1
and R2 of resource type RT1; - Permission P3 applies to resource R3 and R4
of resource type RT2;  This will result in the following access control
lists: - AccessControlList 1: RT1, [R1, R2], [P1, P2] - AccessControlList 2:
RT2, [R3, R4], [P3]

Fields:
  accesses: The accesses that match one of the following conditions: - The
    access_selector, if it is specified in request; - Otherwise, access
    specifiers reachable from the policy binding's role.
  baseResourceType: The unified resource type name of the resource type that
    this access control list is based on, such as
    "compute.googleapis.com/Instance" for Compute Engine instance, etc.
  resourceEdges: Resource edges of the graph starting from the policy
    attached resource to any descendant resources. The Edge.source_node
    contains the full resource name of a parent resource and
    Edge.target_node contains the full resource name of a child resource.
    This field is present only if the output_resource_edges option is
    enabled in request.
  resources: The resources that match one of the following conditions: - The
    resource_selector, if it is specified in request; - Otherwise, resources
    reachable from the policy attached resource.
rN   r   Tr   r   GoogleCloudAssetV1p4alpha1Edger   "GoogleCloudAssetV1p4alpha1Resourcer+   r   N)r   r   r   r   r   r   r   accessesr%   baseResourceTyperesourceEdges	resourcesr   r   r   r   rS   rS      s\    : ##$FTXY(**1-(()I1W[\-$$%I1W[\)r   rS   c                       \ rS rSrSr " S S\R                  5      r\R                  " S5      r	\R                  " SS5      rSrg)	r      a  Represents analysis state of each node in the result graph or non-
critical errors in the response.

Enums:
  CodeValueValuesEnum: The Google standard error code that best describes
    the state. For example: - OK means the node has been successfully
    explored; - PERMISSION_DENIED means an access denied error is
    encountered; - DEADLINE_EXCEEDED means the node hasn't been explored in
    time;

Fields:
  cause: The human-readable description of the cause of failure.
  code: The Google standard error code that best describes the state. For
    example: - OK means the node has been successfully explored; -
    PERMISSION_DENIED means an access denied error is encountered; -
    DEADLINE_EXCEEDED means the node hasn't been explored in time;
c                   \    \ rS rSrSrSrSrSrSrSr	Sr
S	rS
rSrSrSrSrSrSrSrSrSrSrg);GoogleCloudAssetV1p4alpha1AnalysisState.CodeValueValuesEnum   a  The Google standard error code that best describes the state. For
example: - OK means the node has been successfully explored; -
PERMISSION_DENIED means an access denied error is encountered; -
DEADLINE_EXCEEDED means the node hasn't been explored in time;

Values:
  OK: Not an error; returned on success  HTTP Mapping: 200 OK
  CANCELLED: The operation was cancelled, typically by the caller.  HTTP
    Mapping: 499 Client Closed Request
  UNKNOWN: Unknown error.  For example, this error may be returned when a
    `Status` value received from another address space belongs to an error
    space that is not known in this address space.  Also errors raised by
    APIs that do not return enough error information may be converted to
    this error.  HTTP Mapping: 500 Internal Server Error
  INVALID_ARGUMENT: The client specified an invalid argument.  Note that
    this differs from `FAILED_PRECONDITION`.  `INVALID_ARGUMENT` indicates
    arguments that are problematic regardless of the state of the system
    (e.g., a malformed file name).  HTTP Mapping: 400 Bad Request
  DEADLINE_EXCEEDED: The deadline expired before the operation could
    complete. For operations that change the state of the system, this
    error may be returned even if the operation has completed
    successfully.  For example, a successful response from a server could
    have been delayed long enough for the deadline to expire.  HTTP
    Mapping: 504 Gateway Timeout
  NOT_FOUND: Some requested entity (e.g., file or directory) was not
    found.  Note to server developers: if a request is denied for an
    entire class of users, such as gradual feature rollout or undocumented
    whitelist, `NOT_FOUND` may be used. If a request is denied for some
    users within a class of users, such as user-based access control,
    `PERMISSION_DENIED` must be used.  HTTP Mapping: 404 Not Found
  ALREADY_EXISTS: The entity that a client attempted to create (e.g., file
    or directory) already exists.  HTTP Mapping: 409 Conflict
  PERMISSION_DENIED: The caller does not have permission to execute the
    specified operation. `PERMISSION_DENIED` must not be used for
    rejections caused by exhausting some resource (use
    `RESOURCE_EXHAUSTED` instead for those errors). `PERMISSION_DENIED`
    must not be used if the caller can not be identified (use
    `UNAUTHENTICATED` instead for those errors). This error code does not
    imply the request is valid or the requested entity exists or satisfies
    other pre-conditions.  HTTP Mapping: 403 Forbidden
  UNAUTHENTICATED: The request does not have valid authentication
    credentials for the operation.  HTTP Mapping: 401 Unauthorized
  RESOURCE_EXHAUSTED: Some resource has been exhausted, perhaps a per-user
    quota, or perhaps the entire file system is out of space.  HTTP
    Mapping: 429 Too Many Requests
  FAILED_PRECONDITION: The operation was rejected because the system is
    not in a state required for the operation's execution.  For example,
    the directory to be deleted is non-empty, an rmdir operation is
    applied to a non-directory, etc.  Service implementors can use the
    following guidelines to decide between `FAILED_PRECONDITION`,
    `ABORTED`, and `UNAVAILABLE`:  (a) Use `UNAVAILABLE` if the client can
    retry just the failing call.  (b) Use `ABORTED` if the client should
    retry at a higher level      (e.g., when a client-specified test-and-
    set fails, indicating the      client should restart a read-modify-
    write sequence).  (c) Use `FAILED_PRECONDITION` if the client should
    not retry until      the system state has been explicitly fixed.
    E.g., if an "rmdir"      fails because the directory is non-empty,
    `FAILED_PRECONDITION`      should be returned since the client should
    not retry unless      the files are deleted from the directory.  HTTP
    Mapping: 400 Bad Request
  ABORTED: The operation was aborted, typically due to a concurrency issue
    such as a sequencer check failure or transaction abort.  See the
    guidelines above for deciding between `FAILED_PRECONDITION`,
    `ABORTED`, and `UNAVAILABLE`.  HTTP Mapping: 409 Conflict
  OUT_OF_RANGE: The operation was attempted past the valid range.  E.g.,
    seeking or reading past end-of-file.  Unlike `INVALID_ARGUMENT`, this
    error indicates a problem that may be fixed if the system state
    changes. For example, a 32-bit file system will generate
    `INVALID_ARGUMENT` if asked to read at an offset that is not in the
    range [0,2^32-1], but it will generate `OUT_OF_RANGE` if asked to read
    from an offset past the current file size.  There is a fair bit of
    overlap between `FAILED_PRECONDITION` and `OUT_OF_RANGE`.  We
    recommend using `OUT_OF_RANGE` (the more specific error) when it
    applies so that callers who are iterating through a space can easily
    look for an `OUT_OF_RANGE` error to detect when they are done.  HTTP
    Mapping: 400 Bad Request
  UNIMPLEMENTED: The operation is not implemented or is not
    supported/enabled in this service.  HTTP Mapping: 501 Not Implemented
  INTERNAL: Internal errors.  This means that some invariants expected by
    the underlying system have been broken.  This error code is reserved
    for serious errors.  HTTP Mapping: 500 Internal Server Error
  UNAVAILABLE: The service is currently unavailable.  This is most likely
    a transient condition, which can be corrected by retrying with a
    backoff. Note that it is not always safe to retry non-idempotent
    operations.  See the guidelines above for deciding between
    `FAILED_PRECONDITION`, `ABORTED`, and `UNAVAILABLE`.  HTTP Mapping:
    503 Service Unavailable
  DATA_LOSS: Unrecoverable data loss or corruption.  HTTP Mapping: 500
    Internal Server Error
r   r   r   r   r+   r,   r-   r.   r0   r1   r2   r3   r4   r6         r	   r   N)r   r   r   r   r   OK	CANCELLEDUNKNOWNINVALID_ARGUMENTDEADLINE_EXCEEDED	NOT_FOUNDALREADY_EXISTSPERMISSION_DENIEDUNAUTHENTICATEDRESOURCE_EXHAUSTEDFAILED_PRECONDITIONABORTEDOUT_OF_RANGEUNIMPLEMENTEDINTERNALUNAVAILABLE	DATA_LOSSr   r   r   r   CodeValueValuesEnumr^      se    Yt 
BIGINOGLMHKIr   rs   r   r   r   N)r   r   r   r   r   r   Enumrs   r%   cause	EnumFieldcoder   r   r   r   r   r      s?    $kINN kZ 


"%			2A	6$r   r   c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      rSr	g)rU   i_  zsA directional edge.

Fields:
  sourceNode: The source node of the edge.
  targetNode: The target node of the edge.
r   r   r   N)
r   r   r   r   r   r   r%   
sourceNode
targetNoder   r   r   r   rU   rU   _  s)     $$Q'*$$Q'*r   rU   c                   b    \ rS rSrSr\R                  " SS5      r\R                  " S5      r	Sr
g)"GoogleCloudAssetV1p4alpha1Identityik  a  An identity that appears in an access control list.

Fields:
  analysisState: The analysis state of this identity node.
  name: The identity name in any form of members appear in [IAM policy
    binding](https://cloud.google.com/iam/reference/rest/v1/Binding), such
    as: - user:foo@google.com - group:group1@google.com -
    serviceAccount:s1@prj1.iam.gserviceaccount.com -
    projectOwner:some_project_id - domain:google.com - allUsers - etc.
r   r   r   r   N)r   r   r   r   r   r   r   rP   r%   namer   r   r   r   r|   r|   k  s-    	 (()RTUV-			q	!$r   r|   c                   `    \ rS rSrSr\R                  " SSSS9r\R                  " SSSS9rS	r	g
)&GoogleCloudAssetV1p4alpha1IdentityListi{  a  A GoogleCloudAssetV1p4alpha1IdentityList object.

Fields:
  groupEdges: Group identity edges of the graph starting from the binding's
    group members to any node of the identities. The Edge.source_node
    contains a group, such as "group:parent@google.com". The
    Edge.target_node contains a member of the group, such as
    "group:child@google.com" or "user:foo@google.com". This field is present
    only if the output_group_edges option is enabled in request.
  identities: Only the identities that match one of the following conditions
    will be presented: - The identity_selector, if it is specified in
    request; - Otherwise, identities reachable from the policy binding's
    members.
rU   r   Tr   r|   r   r   N)
r   r   r   r   r   r   r   
groupEdges
identitiesr   r   r   r   r   r   {  s5     %%&FTXY*%%&JAX\]*r   r   c                   b    \ rS rSrSr\R                  " SS5      r\R                  " S5      r	Sr
g)rV   i  zA GCP resource that appears in an access control list.

Fields:
  analysisState: The analysis state of this resource node.
  fullResourceName: The [full resource name](https://aip.dev/122#full-
    resource-names).
r   r   r   r   N)r   r   r   r   r   r   r   rP   r%   fullResourceNamer   r   r   r   rV   rV     s.     (()RTUV-**1-r   rV   c                       \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	\R                  " S5      r\R                  " S	S
5      r\R                  " SS5      rSrg)r
   i  a  IAM Policy analysis result, consisting of one IAM policy binding and
derived access control lists.

Fields:
  accessControlLists: The access control lists derived from the iam_binding
    that match or potentially match resource and access selectors specified
    in the request.
  attachedResourceFullName: The full name of the resource to which the
    iam_binding policy attaches.
  fullyExplored: Represents whether all nodes in the transitive closure of
    the iam_binding node have been explored.
  iamBinding: The Cloud IAM policy binding under analysis.
  identityList: The identity list derived from members of the iam_binding
    that match or potentially match identity selector specified in the
    request.
rS   r   Tr   r   r   r!   r+   r   r,   r   N)r   r   r   r   r   r   r   accessControlListsr%   attachedResourceFullNamer   r   
iamBindingidentityListr   r   r   r   r
   r
     sh    " !--.[]^imn&2215((+-%%i3*''(PRST,r   r
   c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " S5      r\R                  " SS	S
S9r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R$                  " SSS9r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      rSrg)StandardQueryParametersi  a  Query parameters accepted by all methods.

Enums:
  FXgafvValueValuesEnum: V1 error format.
  AltValueValuesEnum: Data format for response.

Fields:
  f__xgafv: V1 error format.
  access_token: OAuth access token.
  alt: Data format for response.
  callback: JSONP
  fields: Selector specifying which fields to include in a partial response.
  key: API key. Your API key identifies your project and provides you with
    API access, quota, and reports. Required unless you provide an OAuth 2.0
    token.
  oauth_token: OAuth 2.0 token for the current user.
  prettyPrint: Returns response with indentations and line breaks.
  quotaUser: Available to use for quota purposes for server-side
    applications. Can be any arbitrary string assigned to a user, but should
    not exceed 40 characters.
  trace: A tracing token of the form "token:<tokenid>" to include in api
    requests.
  uploadType: Legacy upload protocol for media (e.g. "media", "multipart").
  upload_protocol: Upload protocol for media (e.g. "raw", "multipart").
c                   $    \ rS rSrSrSrSrSrSrg)*StandardQueryParameters.AltValueValuesEnumi  zData format for response.

Values:
  json: Responses with Content-Type of application/json
  media: Media download with context-dependent Content-Type
  proto: Responses with Content-Type of application/x-protobuf
r   r   r   r   N)	r   r   r   r   r   jsonmediaprotor   r   r   r   AltValueValuesEnumr     s     DEEr   r   c                        \ rS rSrSrSrSrSrg)-StandardQueryParameters.FXgafvValueValuesEnumi  zFV1 error format.

Values:
  _1: v1 error format
  _2: v2 error format
r   r   r   N)r   r   r   r   r   _1_2r   r   r   r   FXgafvValueValuesEnumr     s     
B	
Br   r   r   r   r   r   )defaultr+   r,   r-   r.   r0   Tr1   r2   r3   r4   r   N)r   r   r   r   r   r   rt   r   r   rv   f__xgafvr%   access_tokenaltcallbackfieldskeyoauth_tokenr   prettyPrint	quotaUsertrace
uploadTypeupload_protocolr   r   r   r   r   r     s    4
9>> 
inn    !8!<(&&q),0!VD#""1%(  #&a #%%a(+&&q$7+##A&)



#%$$R(*))"-/r   r   r   z$.xgafvr   1r   2r7   zaccessSelector.permissionsr8   zaccessSelector.rolesr9   zidentitySelector.identityr:   zoptions.expandGroupsr;   zoptions.expandResourcesr<   zoptions.expandRolesr@   zoptions.maxFanoutsPerGrouprA   zoptions.maxFanoutsPerResourcerB   zoptions.outputGroupEdgesrC   z(options.outputPartialResultBeforeTimeoutrD   zoptions.outputResourceEdgesrF   z!resourceSelector.fullResourceNameN)r   
__future__r   apitools.base.protorpcliter   r   apitools.base.pyr   packageMessager   r!   r)   r#   rN   rS   r   rU   r|   r   rV   r
   r   AddCustomJsonFieldMappingAddCustomJsonEnumMappingr   r   r   r   <module>r      s   ' < % jy00 j$,"i ,"^=@	(9(9 =@@#9 #0"y'8'8 "!])2C2C !]HA7i.?.? A7H	(Y%6%6 	("):): " ^Y->-> ^(
.):): 
.Ui// U2<.i// <.~ 	 " "Z4  ! !114>  ! !114>  " "%'CEac  " "%'=?UW  " "%'BD_a  " "%'=?UW  " "%'@B[]  " "%'<>SU  " "%'CEac  " "%'FHgi  " "%'AC]_  " "%'QS}  " "%'DFce  " "%'JLoqr   