
                           S r SSKJr  SSKJr  SSKJr  SSKJr  Sr	 " S S\R                  5      r " S	 S
\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S \R                  5      r " S! S"\R                  5      r " S# S$\R                  5      r " S% S&\R                  5      r " S' S(\R                  5      r " S) S*\R                  5      r " S+ S,\R                  5      r " S- S.\R                  5      r " S/ S0\R                  5      r " S1 S2\R                  5      r  " S3 S4\R                  5      r! " S5 S6\R                  5      r" " S7 S8\R                  5      r# " S9 S:\R                  5      r$ " S; S<\R                  5      r% " S= S>\R                  5      r& " S? S@\R                  5      r' " SA SB\R                  5      r( " SC SD\R                  5      r) " SE SF\R                  5      r* " SG SH\R                  5      r+ " SI SJ\R                  5      r, " SK SL\R                  5      r- " SM SN\R                  5      r. " SO SP\R                  5      r/ " SQ SR\R                  5      r0 " SS ST\R                  5      r1 " SU SV\R                  5      r2 " SW SX\R                  5      r3 " SY SZ\R                  5      r4 " S[ S\\R                  5      r5 " S] S^\R                  5      r6 " S_ S`\R                  5      r7 " Sa Sb\R                  5      r8 " Sc Sd\R                  5      r9 " Se Sf\R                  5      r: " Sg Sh\R                  5      r; " Si Sj\R                  5      r< " Sk Sl\R                  5      r= " Sm Sn\R                  5      r> " So Sp\R                  5      r? " Sq Sr\R                  5      r@ " Ss St\R                  5      rA " Su Sv\R                  5      rB " Sw Sx\R                  5      rC " Sy Sz\R                  5      rD " S{ S|\R                  5      rE " S} S~\R                  5      rF " S S\R                  5      rG " S S\R                  5      rH " S S\R                  5      rI " S S\R                  5      rJ " S S\R                  5      rK " S S\R                  5      rL " S S\R                  5      rM " S S\R                  5      rN " S S\R                  5      rO " S S\R                  5      rP " S S\R                  5      rQ " S S\R                  5      rR " S S\R                  5      rS " S S\R                  5      rT " S S\R                  5      rU " S S\R                  5      rV " S S\R                  5      rW " S S\R                  5      rX " S S\R                  5      rY " S S\R                  5      rZ " S S\R                  5      r[ " S S\R                  5      r\ " S S\R                  5      r] " S S\R                  5      r^ " S S\R                  5      r_ " S S\R                  5      r` " S S\R                  5      ra " S S\R                  5      rb " S S\R                  5      rc " S S\R                  5      rd " S S\R                  5      re " S S\R                  5      rf " S S\R                  5      rg " S S\R                  5      rh " S S\R                  5      ri " S S\R                  5      rj " S S\R                  5      rk " S S\R                  5      rl " S S\R                  5      rm " S S\R                  5      rn " S S\R                  5      ro\R                  " \MSS5        \R                  " \oSS5        \R                  " \oR                  SS5        \R                  " \oR                  SS5        g)zEGenerated message classes for policytroubleshooter version v3alpha.

    )absolute_import)messages)encoding)extra_typespolicytroubleshooterc                       \ rS rSrSr\R                  " S5      r\R                  " S\R                  R                  S9rSrg)GoogleApiExprEnumValue   zkAn enum value.

Fields:
  type: The fully qualified name of the enum type.
  value: The value of the enum.
      variant N)__name__
__module____qualname____firstlineno____doc__	_messagesStringFieldtypeIntegerFieldVariantINT32value__static_attributes__r       olib/googlecloudsdk/generated_clients/apis/policytroubleshooter/v3alpha/policytroubleshooter_v3alpha_messages.pyr	   r	      s7     
		q	!$

 
 I,=,=,C,C
D%r   r	   c                   <    \ rS rSrSr\R                  " SSSS9rSrg)	GoogleApiExprListValue   zA list. Wrapped in a message so 'not set' and empty can be
differentiated, which is required for use in a 'oneof'.

Fields:
  values: The ordered values in the list.
GoogleApiExprValuer   Trepeatedr   N)	r   r   r   r   r   r   MessageFieldvaluesr   r   r   r   r    r       s     !!"6DI&r   r    c                   <    \ rS rSrSr\R                  " SSSS9rSrg)	GoogleApiExprMapValue'   zA map. Wrapped in a message so 'not set' and empty can be
differentiated, which is required for use in a 'oneof'.

Fields:
  entries: The set of map entries. CEL has fewer restrictions on keys, so a
    protobuf map representation cannot be used.
GoogleApiExprMapValueEntryr   Tr#   r   N)	r   r   r   r   r   r   r%   entriesr   r   r   r   r(   r(   '   s     ""#?TR'r   r(   c                   d    \ rS rSrSr\R                  " SS5      r\R                  " SS5      rSr	g)r*   3   zA GoogleApiExprMapValueEntry object.

Fields:
  key: The key. Must be unique with in the map. Currently only boolean, int,
    uint, and string values can be keys.
  value: The value.
r"   r   r   r   N)
r   r   r   r   r   r   r%   keyr   r   r   r   r   r*   r*   3   s/     	3Q7#

 
 !5q
9%r   r*   c                   v   \ rS rSrSr " S S\R                  5      r\R                  " S5       " S S\R                  5      5       r\R                  " S5      r\R                  " S	5      r\R                   " S
5      r\R$                  " SS5      r\R(                  " S5      r\R$                  " SS5      r\R$                  " SS5      r\R0                  " SS5      r\R$                  " SS5      r\R6                  " S5      r\R6                  " S5      r\R(                  " S\R<                  R>                  S9r Sr!g)r"   @   a}  Represents a CEL value. This is similar to `google.protobuf.Value`, but
can represent CEL's full range of values.

Enums:
  NullValueValueValuesEnum: Null value.

Messages:
  ObjectValueValue: The proto message backing an object value.

Fields:
  boolValue: Boolean value.
  bytesValue: Byte string value.
  doubleValue: Floating point value.
  enumValue: An enum value.
  int64Value: Signed integer value.
  listValue: List value.
  mapValue: Map value.
  nullValue: Null value.
  objectValue: The proto message backing an object value.
  stringValue: UTF-8 string value.
  typeValue: Type value.
  uint64Value: Unsigned integer value.
c                       \ rS rSrSrSrSrg)+GoogleApiExprValue.NullValueValueValuesEnumY   z/Null value.

Values:
  NULL_VALUE: Null value.
r   r   N)r   r   r   r   r   
NULL_VALUEr   r   r   r   NullValueValueValuesEnumr2   Y   s    
 Jr   r5   additionalPropertiesc                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
#GoogleApiExprValue.ObjectValueValuea   zThe proto message backing an object value.

Messages:
  AdditionalProperty: An additional property for a ObjectValueValue
    object.

Fields:
  additionalProperties: Properties of the object. Contains field @type
    with type URL.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)6GoogleApiExprValue.ObjectValueValue.AdditionalPropertyn   zAn additional property for a ObjectValueValue object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   extra_types.JsonValuer   r   Nr   r   r   r   r   r   r   r.   r%   r   r   r   r   r   AdditionalPropertyr;   n   ,    
 !!!$c$$%<a@er   r?   r   Tr#   r   Nr   r   r   r   r   r   Messager?   r%   r6   r   r   r   r   ObjectValueValuer8   a   4    		AY.. 	A %112FTXYr   rC   r   r      r	         r       r(         	   
         r   r   N)"r   r   r   r   r   r   Enumr5   r   MapUnrecognizedFieldsrB   rC   BooleanField	boolValue
BytesField
bytesValue
FloatFielddoubleValuer%   	enumValuer   
int64Value	listValuemapValue	EnumField	nullValueobjectValuer   stringValue	typeValuer   UINT64uint64Valuer   r   r   r   r"   r"   @   s&   0  !!"89Z** Z :Z2 $$Q')##A&*$$Q'+$$%=qA)%%a(*$$%=qA)##$;Q?(!!"<a@)&&'91=+%%b)+##B')&&r93D3D3K3KL+r   r"   c                   h    \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	Sr
g)+GoogleCloudAuditAuthorizationLoggingOptions   zAuthorization-related information used by Cloud Audit Logging.

Enums:
  PermissionTypeValueValuesEnum: The type of the permission that was
    checked.

Fields:
  permissionType: The type of the permission that was checked.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
IGoogleCloudAuditAuthorizationLoggingOptions.PermissionTypeValueValuesEnum   a  The type of the permission that was checked.

Values:
  PERMISSION_TYPE_UNSPECIFIED: Default. Should not be used.
  ADMIN_READ: A read of admin (meta) data.
  ADMIN_WRITE: A write of admin (meta) data.
  DATA_READ: A read of standard data.
  DATA_WRITE: A write of standard data.
r   r   r   rE   rF   r   Nr   r   r   r   r   PERMISSION_TYPE_UNSPECIFIED
ADMIN_READADMIN_WRITE	DATA_READ
DATA_WRITEr   r   r   r   PermissionTypeValueValuesEnumrf      s#     #$JKIJr   rn   r   r   N)r   r   r   r   r   r   rO   rn   r[   permissionTyper   r   r   r   rc   rc      s,    inn   &&'FJ.r   rc   c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r	\R                  " SS	S
S9r\R                  " SS5      r\R                  " SS5      rSrg)YGoogleCloudPolicytroubleshooterGcpuseraccessbindingV3alphaGcpUserAccessBindingExplanation   aP  The explanation of the GcpUserAccessBinding. NextTAG: 4

Enums:
  AccessLevelEvaluationStatesValueListEntryValuesEnum:
  EvalStateValueValuesEnum: Output only. Evaluation state of this
    GcpUserAccessBinding.
  PrincipalStateValueValuesEnum: Output only. Principal evaluation states
    indicating whether the principals match.

Fields:
  accessLevelEvaluationStates: Output only. Access level evaluation states.
  evalState: Output only. Evaluation state of this GcpUserAccessBinding.
  principalState: Output only. Principal evaluation states indicating
    whether the principals match.
c                   0    \ rS rSrSrSrSrSrSrSr	Sr
S	rg
)ڍGoogleCloudPolicytroubleshooterGcpuseraccessbindingV3alphaGcpUserAccessBindingExplanation.AccessLevelEvaluationStatesValueListEntryValuesEnum   a  AccessLevelEvaluationStatesValueListEntryValuesEnum enum type.

Values:
  ACCESS_LEVEL_EVAL_STATE_UNSPECIFIED: Not used
  ACCESS_LEVEL_EVAL_STATE_SATISFIED: The access level is satisfied
  ACCESS_LEVEL_EVAL_STATE_UNSATISFIED: The access level is unsatisfied
  ACCESS_LEVEL_EVAL_STATE_ERROR: The access level is not satisfied nor
    unsatisfied
  ACCESS_LEVEL_EVAL_STATE_NOT_EXIST: The access level does not exist
  ACCESS_LEVEL_EVAL_STATE_INFO_DENIED: No permission to read access
    levels.
r   r   r   rE   rF   rG   r   N)r   r   r   r   r   #ACCESS_LEVEL_EVAL_STATE_UNSPECIFIED!ACCESS_LEVEL_EVAL_STATE_SATISFIED#ACCESS_LEVEL_EVAL_STATE_UNSATISFIEDACCESS_LEVEL_EVAL_STATE_ERROR!ACCESS_LEVEL_EVAL_STATE_NOT_EXIST#ACCESS_LEVEL_EVAL_STATE_INFO_DENIEDr   r   r   r   3AccessLevelEvaluationStatesValueListEntryValuesEnumrt      s-     +,'()%*+'$%!()%*+'r   r|   c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
rGoogleCloudPolicytroubleshooterGcpuseraccessbindingV3alphaGcpUserAccessBindingExplanation.EvalStateValueValuesEnum   a  Output only. Evaluation state of this GcpUserAccessBinding.

Values:
  EVAL_STATE_UNSPECIFIED: Not used
  EVAL_STATE_GRANTED: The GcpUserAccessBinding grants the request.
  EVAL_STATE_DENIED: The GcpUserAccessBinding denies the request.
  EVAL_STATE_NOT_APPLICABLE: The GcpUserAccessBinding is not applicable
    for the principal.
  EVAL_STATE_UNKNOWN: / No enough information to get a conclusion.
r   r   r   rE   rF   r   N)r   r   r   r   r   EVAL_STATE_UNSPECIFIEDEVAL_STATE_GRANTEDEVAL_STATE_DENIEDEVAL_STATE_NOT_APPLICABLEEVAL_STATE_UNKNOWNr   r   r   r   EvalStateValueValuesEnumr~      s'    	  !r   r   c                   0    \ rS rSrSrSrSrSrSrSr	Sr
S	rg
)wGoogleCloudPolicytroubleshooterGcpuseraccessbindingV3alphaGcpUserAccessBindingExplanation.PrincipalStateValueValuesEnum   a_  Output only. Principal evaluation states indicating whether the
principals match.

Values:
  PRINCIPAL_STATE_UNSPECIFIED: Not used
  PRINCIPAL_STATE_MATCHED: Principal matches the GcpUserAccessBinding
    principal.
  PRINCIPAL_STATE_UNMATCHED: Principal does not match the
    GcpUserAccessBinding principal.
  PRINCIPAL_STATE_NOT_FOUND: GcpUserAccessBinding principal does not
    exist.
  PRINCIPAL_STATE_INFO_DENIED: Principal does not have enough permission
    to read the GcpUserAccessBinding principal.
  PRINCIPAL_STATE_UNSUPPORTED: Denied or target principal is not supported
    to troubleshoot.
r   r   r   rE   rF   rG   r   N)r   r   r   r   r   PRINCIPAL_STATE_UNSPECIFIEDPRINCIPAL_STATE_MATCHEDPRINCIPAL_STATE_UNMATCHEDPRINCIPAL_STATE_NOT_FOUNDPRINCIPAL_STATE_INFO_DENIEDPRINCIPAL_STATE_UNSUPPORTEDr   r   r   r   PrincipalStateValueValuesEnumr      s-      #$ ! !"#"#r   r   r   Tr#   r   rE   r   N)r   r   r   r   r   r   rO   r|   r   r   r[   accessLevelEvaluationStates	evalStateprincipalStater   r   r   r   rq   rq      sw     ,INN ,( "$inn $0 !* 3 34iklw{ |!!"<a@)&&'FJ.r   rq   c                   <    \ rS rSrSr\R                  " S5      rSrg)aGoogleCloudPolicytroubleshooterGcpuseraccessbindingV3alphaTroubleshootGcpUserAccessBindingRequest   zRequest to troubleshoot GcpUserAccessBinding.

Fields:
  troubleshootingToken: Optional. The troubleshooting token can be generated
    when customers get access denied by the GcpUserAccessBinding.
r   r   N	r   r   r   r   r   r   r   troubleshootingTokenr   r   r   r   r   r           #..q1r   r   c                       \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " SSSS	9r\R                  " S
5      rSrg)bGoogleCloudPolicytroubleshooterGcpuseraccessbindingV3alphaTroubleshootGcpUserAccessBindingResponsei  aZ  Response for troubleshooting GcpUserAccessBinding.

Enums:
  AccessStateValueValuesEnum: Output only. The access state of the request.

Fields:
  accessState: Output only. The access state of the request.
  gcpUserAccessBindingExplanations: The explanation of the
    GcpUserAccessBinding.
  principal: The principal email address of the caller.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
}GoogleCloudPolicytroubleshooterGcpuseraccessbindingV3alphaTroubleshootGcpUserAccessBindingResponse.AccessStateValueValuesEnumi  a  Output only. The access state of the request.

Values:
  ACCESS_STATE_UNSPECIFIED: Not used
  ACCESS_STATE_GRANTED: The request is granted by GcpUserAccessBinding.
  ACCESS_STATE_DENIED: The request is denied by GcpUserAccessBinding.
  ACCESS_STATE_NOT_APPLICABLE: GcpUserAccessBinding are not applicable to
    principal.
  ACCESS_STATE_UNKNOWN: No enough information to get a conclusion.
r   r   r   rE   rF   r   N)r   r   r   r   r   ACCESS_STATE_UNSPECIFIEDACCESS_STATE_GRANTEDACCESS_STATE_DENIEDACCESS_STATE_NOT_APPLICABLEACCESS_STATE_UNKNOWNr   r   r   r   AccessStateValueValuesEnumr     s'    	  !"#r   r   r   rq   r   Tr#   rE   r   N)r   r   r   r   r   r   rO   r   r[   accessStater%    gcpUserAccessBindingExplanationsr   	principalr   r   r   r   r   r     sb    
9>> " ##$@!D+%.%;%;  =X  Z[  fj  &k"##A&)r   r   c                       \ rS rSrSr\R                  " SS5      r\R                  " S5      r	\R                  " S5      r
\R                  " S5      r\R                  " S5      rS	rg
)4GoogleCloudPolicytroubleshooterIamV3alphaAccessTuplei(  a!  Information about the principal, resource, and permission to check.

Fields:
  conditionContext: Optional. Additional context for the request, such as
    the request time or IP address. This context allows Policy
    Troubleshooter to troubleshoot conditional role bindings and deny rules.
  fullResourceName: Required. The full resource name that identifies the
    resource. For example, `//compute.googleapis.com/projects/my-
    project/zones/us-central1-a/instances/my-instance`. For examples of full
    resource names for Google Cloud services, see
    https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
  permission: Required. The IAM permission to check for, either in the `v1`
    permission format or the `v2` permission format. For a complete list of
    IAM permissions in the `v1` format, see
    https://cloud.google.com/iam/help/permissions/reference. For a list of
    IAM permissions in the `v2` format, see
    https://cloud.google.com/iam/help/deny/supported-permissions. For a
    complete list of predefined IAM roles and the permissions in each role,
    see https://cloud.google.com/iam/help/roles/reference.
  permissionFqdn: Output only. The permission that Policy Troubleshooter
    checked for, in the `v2` format.
  principal: Required. The email address of the principal whose access you
    want to check. For example, `alice@example.com` or `my-service-
    account@my-project.iam.gserviceaccount.com`. The principal must be a
    Google Account or a service account. Other types of principals are not
    supported.
9GoogleCloudPolicytroubleshooterIamV3alphaConditionContextr   r   rE   rF   rG   r   N)r   r   r   r   r   r   r%   conditionContextr   fullResourceName
permissionpermissionFqdnr   r   r   r   r   r   r   (  s_    8 ++,gijk**1-$$Q'*((+.##A&)r   r   c                   h   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r	 " S	 S
\R                  5      r
\R                  " S5       " S S\R                  5      5       r\R                  " SS5      r\R"                  " SS5      r\R"                  " SS5      r\R"                  " SS5      r\R"                  " SS5      r\R                  " SS5      r\R.                  " S5      r\R                  " S
S5      r\R                  " SS5      rSrg)@GoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanationiL  a"  Details about how a role binding in an allow policy affects a
principal's ability to use a permission.

Enums:
  AllowAccessStateValueValuesEnum: Required. Indicates whether _this role
    binding_ gives the specified permission to the specified principal on
    the specified resource. This field does _not_ indicate whether the
    principal actually has the permission on the resource. There might be
    another role binding that overrides this role binding. To determine
    whether the principal actually has the permission, use the
    `overall_access_state` field in the TroubleshootIamPolicyResponse.
  RelevanceValueValuesEnum: The relevance of this role binding to the
    overall determination for the entire policy.
  RolePermissionValueValuesEnum: Indicates whether the role granted by this
    role binding contains the specified permission.
  RolePermissionRelevanceValueValuesEnum: The relevance of the permission's
    existence, or nonexistence, in the role to the overall determination for
    the entire policy.

Messages:
  MembershipsValue: Indicates whether each role binding includes the
    principal specified in the request, either directly or indirectly. Each
    key identifies a principal in the role binding, and each value indicates
    whether the principal in the role binding includes the principal in the
    request. For example, suppose that a role binding includes the following
    principals: * `user:alice@example.com` * `group:product-eng@example.com`
    You want to troubleshoot access for `user:bob@example.com`. This user is
    a member of the group `group:product-eng@example.com`. For the first
    principal in the role binding, the key is `user:alice@example.com`, and
    the `membership` field in the value is set to `NOT_INCLUDED`. For the
    second principal in the role binding, the key is `group:product-
    eng@example.com`, and the `membership` field in the value is set to
    `INCLUDED`.

Fields:
  allowAccessState: Required. Indicates whether _this role binding_ gives
    the specified permission to the specified principal on the specified
    resource. This field does _not_ indicate whether the principal actually
    has the permission on the resource. There might be another role binding
    that overrides this role binding. To determine whether the principal
    actually has the permission, use the `overall_access_state` field in the
    TroubleshootIamPolicyResponse.
  combinedMembership: The combined result of all memberships. Indicates if
    the principal is included in any role binding, either directly or
    indirectly.
  condition: A condition expression that specifies when the role binding
    grants access. To learn about IAM Conditions, see
    https://cloud.google.com/iam/help/conditions/overview.
  conditionExplanation: Condition evaluation state for this role binding.
  memberships: Indicates whether each role binding includes the principal
    specified in the request, either directly or indirectly. Each key
    identifies a principal in the role binding, and each value indicates
    whether the principal in the role binding includes the principal in the
    request. For example, suppose that a role binding includes the following
    principals: * `user:alice@example.com` * `group:product-eng@example.com`
    You want to troubleshoot access for `user:bob@example.com`. This user is
    a member of the group `group:product-eng@example.com`. For the first
    principal in the role binding, the key is `user:alice@example.com`, and
    the `membership` field in the value is set to `NOT_INCLUDED`. For the
    second principal in the role binding, the key is `group:product-
    eng@example.com`, and the `membership` field in the value is set to
    `INCLUDED`.
  relevance: The relevance of this role binding to the overall determination
    for the entire policy.
  role: The role that this role binding grants. For example,
    `roles/compute.admin`. For a complete list of predefined IAM roles, as
    well as the permissions in each role, see
    https://cloud.google.com/iam/help/roles/reference.
  rolePermission: Indicates whether the role granted by this role binding
    contains the specified permission.
  rolePermissionRelevance: The relevance of the permission's existence, or
    nonexistence, in the role to the overall determination for the entire
    policy.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
`GoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanation.AllowAccessStateValueValuesEnumi  a  Required. Indicates whether _this role binding_ gives the specified
permission to the specified principal on the specified resource. This
field does _not_ indicate whether the principal actually has the
permission on the resource. There might be another role binding that
overrides this role binding. To determine whether the principal actually
has the permission, use the `overall_access_state` field in the
TroubleshootIamPolicyResponse.

Values:
  ALLOW_ACCESS_STATE_UNSPECIFIED: Not specified.
  ALLOW_ACCESS_STATE_GRANTED: The allow policy gives the principal the
    permission.
  ALLOW_ACCESS_STATE_NOT_GRANTED: The allow policy doesn't give the
    principal the permission.
  ALLOW_ACCESS_STATE_UNKNOWN_CONDITIONAL: The allow policy gives the
    principal the permission if a condition expression evaluate to `true`.
    However, the sender of the request didn't provide enough context for
    Policy Troubleshooter to evaluate the condition expression.
  ALLOW_ACCESS_STATE_UNKNOWN_INFO: The sender of the request doesn't have
    access to all of the allow policies that Policy Troubleshooter needs
    to evaluate the principal's access.
r   r   r   rE   rF   r   Nr   r   r   r   r   ALLOW_ACCESS_STATE_UNSPECIFIEDALLOW_ACCESS_STATE_GRANTEDALLOW_ACCESS_STATE_NOT_GRANTED&ALLOW_ACCESS_STATE_UNKNOWN_CONDITIONALALLOW_ACCESS_STATE_UNKNOWN_INFOr   r   r   r   AllowAccessStateValueValuesEnumr     '    , &'"!"%&"-.*&'#r   r   c                   $    \ rS rSrSrSrSrSrSrg)YGoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanation.RelevanceValueValuesEnumi    The relevance of this role binding to the overall determination for
the entire policy.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   N	r   r   r   r   r   HEURISTIC_RELEVANCE_UNSPECIFIEDHEURISTIC_RELEVANCE_NORMALHEURISTIC_RELEVANCE_HIGHr   r   r   r   RelevanceValueValuesEnumr          '(#!" r   r   c                   $    \ rS rSrSrSrSrSrSrg)gGoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanation.RolePermissionRelevanceValueValuesEnumi  a  The relevance of the permission's existence, or nonexistence, in the
role to the overall determination for the entire policy.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   &RolePermissionRelevanceValueValuesEnumr     r   r   r   c                   (    \ rS rSrSrSrSrSrSrSr	g)	^GoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanation.RolePermissionValueValuesEnumi  a  Indicates whether the role granted by this role binding contains the
specified permission.

Values:
  ROLE_PERMISSION_INCLUSION_STATE_UNSPECIFIED: Not specified.
  ROLE_PERMISSION_INCLUDED: The permission is included in the role.
  ROLE_PERMISSION_NOT_INCLUDED: The permission is not included in the
    role.
  ROLE_PERMISSION_UNKNOWN_INFO: The sender of the request is not allowed
    to access the role definition.
r   r   r   rE   r   N)
r   r   r   r   r   +ROLE_PERMISSION_INCLUSION_STATE_UNSPECIFIEDROLE_PERMISSION_INCLUDEDROLE_PERMISSION_NOT_INCLUDEDROLE_PERMISSION_UNKNOWN_INFOr   r   r   r   RolePermissionValueValuesEnumr     s!    
 34/ #$ #$ r   r   r6   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
QGoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanation.MembershipsValuei  a  Indicates whether each role binding includes the principal specified
in the request, either directly or indirectly. Each key identifies a
principal in the role binding, and each value indicates whether the
principal in the role binding includes the principal in the request. For
example, suppose that a role binding includes the following principals: *
`user:alice@example.com` * `group:product-eng@example.com` You want to
troubleshoot access for `user:bob@example.com`. This user is a member of
the group `group:product-eng@example.com`. For the first principal in the
role binding, the key is `user:alice@example.com`, and the `membership`
field in the value is set to `NOT_INCLUDED`. For the second principal in
the role binding, the key is `group:product-eng@example.com`, and the
`membership` field in the value is set to `INCLUDED`.

Messages:
  AdditionalProperty: An additional property for a MembershipsValue
    object.

Fields:
  additionalProperties: Additional properties of type MembershipsValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)dGoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanation.MembershipsValue.AdditionalPropertyi  zAn additional property for a MembershipsValue object.

Fields:
  key: Name of the additional property.
  value: A GoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanat
    ionAnnotatedAllowMembership attribute.
r   XGoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanationAnnotatedAllowMembershipr   r   Nr>   r   r   r   r?   r     s4    
 !!!$c$$%  BC  Der   r?   r   Tr#   r   NrA   r   r   r   MembershipsValuer     s4    *
DY.. 
D %112FTXYr   r   r   r   r   GoogleTypeExprrE   =GoogleCloudPolicytroubleshooterIamV3alphaConditionExplanationrF   rG   rH   rI   rJ   rK   r   N)r   r   r   r   r   r   rO   r   r   r   r   r   rP   rB   r   r[   allowAccessStater%   combinedMembership	conditionconditionExplanationmemberships	relevancer   rolerolePermissionrolePermissionRelevancer   r   r   r   r   r   L  s5   IV(	 (:! !"!y~~ !"%inn %" !!"89"Z** "Z :"ZH (()JAN --  /I  KL  M$$%5q9)"//0oqrs&&'91=+!!"<a@)			q	!$&&'FJ.%//0XZ[\r   r   c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS5      rS	rg
)r   i  a  Details about whether the role binding includes the principal.

Enums:
  MembershipValueValuesEnum: Indicates whether the role binding includes the
    principal.
  RelevanceValueValuesEnum: The relevance of the principal's status to the
    overall determination for the role binding.

Fields:
  membership: Indicates whether the role binding includes the principal.
  relevance: The relevance of the principal's status to the overall
    determination for the role binding.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
rGoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanationAnnotatedAllowMembership.MembershipValueValuesEnumi'  a  Indicates whether the role binding includes the principal.

Values:
  MEMBERSHIP_MATCHING_STATE_UNSPECIFIED: Not specified.
  MEMBERSHIP_MATCHED: The principal in the request matches the principal
    in the policy. The principal can be included directly or indirectly: *
    A principal is included directly if that principal is listed in the
    role binding. * A principal is included indirectly if that principal
    is in a Google group, Google Workspace account, or Cloud Identity
    domain that is listed in the policy.
  MEMBERSHIP_NOT_MATCHED: The principal in the request doesn't match the
    principal in the policy.
  MEMBERSHIP_UNKNOWN_INFO: The principal in the policy is a group or
    domain, and the sender of the request doesn't have permission to view
    whether the principal in the request is a member of the group or
    domain.
  MEMBERSHIP_UNKNOWN_UNSUPPORTED: The principal is an unsupported type.
r   r   r   rE   rF   r   Nr   r   r   r   r   %MEMBERSHIP_MATCHING_STATE_UNSPECIFIEDMEMBERSHIP_MATCHEDMEMBERSHIP_NOT_MATCHEDMEMBERSHIP_UNKNOWN_INFOMEMBERSHIP_UNKNOWN_UNSUPPORTEDr   r   r   r   MembershipValueValuesEnumr   '  s'    $ -.)%&"r   r   c                   $    \ rS rSrSrSrSrSrSrg)qGoogleCloudPolicytroubleshooterIamV3alphaAllowBindingExplanationAnnotatedAllowMembership.RelevanceValueValuesEnumi@    The relevance of the principal's status to the overall determination
for the role binding.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r   @  r   r   r   r   r   r   Nr   r   r   r   r   r   rO   r   r   r[   
membershipr   r   r   r   r   r   r     sO    ').. '2! !" ""#>B*!!"<a@)r   r   c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS	S
S9r\R                  " SS5      rSrg)?GoogleCloudPolicytroubleshooterIamV3alphaAllowPolicyExplanationiU  a  Details about how the relevant IAM allow policies affect the final
access state.

Enums:
  AllowAccessStateValueValuesEnum: Indicates whether the principal has the
    specified permission for the specified resource, based on evaluating all
    applicable IAM allow policies.
  RelevanceValueValuesEnum: The relevance of the allow policy type to the
    overall access state.

Fields:
  allowAccessState: Indicates whether the principal has the specified
    permission for the specified resource, based on evaluating all
    applicable IAM allow policies.
  explainedPolicies: List of IAM allow policies that were evaluated to check
    the principal's permissions, with annotations to indicate how each
    policy contributed to the final result. The list of policies includes
    the policy for the resource itself, as well as allow policies that are
    inherited from higher levels of the resource hierarchy, including the
    organization, the folder, and the project. To learn more about the
    resource hierarchy, see https://cloud.google.com/iam/help/resource-
    hierarchy.
  relevance: The relevance of the allow policy type to the overall access
    state.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
_GoogleCloudPolicytroubleshooterIamV3alphaAllowPolicyExplanation.AllowAccessStateValueValuesEnumip  aW  Indicates whether the principal has the specified permission for the
specified resource, based on evaluating all applicable IAM allow policies.

Values:
  ALLOW_ACCESS_STATE_UNSPECIFIED: Not specified.
  ALLOW_ACCESS_STATE_GRANTED: The allow policy gives the principal the
    permission.
  ALLOW_ACCESS_STATE_NOT_GRANTED: The allow policy doesn't give the
    principal the permission.
  ALLOW_ACCESS_STATE_UNKNOWN_CONDITIONAL: The allow policy gives the
    principal the permission if a condition expression evaluate to `true`.
    However, the sender of the request didn't provide enough context for
    Policy Troubleshooter to evaluate the condition expression.
  ALLOW_ACCESS_STATE_UNKNOWN_INFO: The sender of the request doesn't have
    access to all of the allow policies that Policy Troubleshooter needs
    to evaluate the principal's access.
r   r   r   rE   rF   r   Nr   r   r   r   r   r   p  s'    " &'"!"%&"-.*&'#r   r   c                   $    \ rS rSrSrSrSrSrSrg)XGoogleCloudPolicytroubleshooterIamV3alphaAllowPolicyExplanation.RelevanceValueValuesEnumi  a  The relevance of the allow policy type to the overall access state.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r         
 '(#!" r   r   r   =GoogleCloudPolicytroubleshooterIamV3alphaExplainedAllowPolicyr   Tr#   rE   r   N)r   r   r   r   r   r   rO   r   r   r[   r   r%   explainedPoliciesr   r   r   r   r   r   r   U  sh    4(	 (0! !  (()JAN,,-lnoz~!!"<a@)r   r   c                       \ rS rSrSr\R                  " SS5      r\R                  " SSSS9r\R                  " S	S
5      r	\R                  " SS5      r
Srg)r   i  a  Additional context for troubleshooting conditional role bindings and
deny rules.

Fields:
  destination: The destination of a network activity, such as accepting a
    TCP connection. In a multi-hop network activity, the destination
    represents the receiver of the last hop.
  effectiveTags: Output only. The effective tags on the resource. The
    effective tags are fetched during troubleshooting.
  request: Represents a network request, such as an HTTP request.
  resource: Represents a target resource that is involved with a network
    activity. If multiple resources are involved with an activity, this must
    be the primary one.
=GoogleCloudPolicytroubleshooterIamV3alphaConditionContextPeerr   EGoogleCloudPolicytroubleshooterIamV3alphaConditionContextEffectiveTagr   Tr#   @GoogleCloudPolicytroubleshooterIamV3alphaConditionContextRequestrE   AGoogleCloudPolicytroubleshooterIamV3alphaConditionContextResourcerF   r   N)r   r   r   r   r   r   r%   destinationeffectiveTagsrequestresourcer   r   r   r   r   r     sc     &&'fhij+(()prs  C  D-""#eghi'##$gijk(r   r   c                       \ rS rSrSr\R                  " S5      r\R                  " S5      r	\R                  " S5      r
\R                  " S5      r\R                  " S5      r\R                  " S5      rS	rg
)r   i  a  A tag that applies to a resource during policy evaluation. Tags can be
either directly bound to a resource or inherited from its ancestor.
`EffectiveTag` contains the `name` and `namespaced_name` of the tag value
and tag key, with additional fields of `inherited` to indicate the
inheritance status of the effective tag.

Fields:
  inherited: Output only. Indicates the inheritance status of a tag value
    attached to the given resource. If the tag value is inherited from one
    of the resource's ancestors, inherited will be true. If false, then the
    tag value is directly attached to the resource, inherited will be false.
  namespacedTagKey: Output only. The namespaced name of the TagKey. Can be
    in the form `{organization_id}/{tag_key_short_name}` or
    `{project_id}/{tag_key_short_name}` or
    `{project_number}/{tag_key_short_name}`.
  namespacedTagValue: Output only. The namespaced name of the TagValue. Can
    be in the form
    `{organization_id}/{tag_key_short_name}/{tag_value_short_name}` or
    `{project_id}/{tag_key_short_name}/{tag_value_short_name}` or
    `{project_number}/{tag_key_short_name}/{tag_value_short_name}`.
  tagKey: Output only. The name of the TagKey, in the format `tagKeys/{id}`,
    such as `tagKeys/123`.
  tagKeyParentName: The parent name of the tag key. Must be in the format
    `organizations/{organization_id}` or `projects/{project_number}`
  tagValue: Output only. Resource name for TagValue in the format
    `tagValues/456`.
r   r   rE   rF   rG   rH   r   N)r   r   r   r   r   r   rQ   	inheritedr   namespacedTagKeynamespacedTagValuetagKeytagKeyParentNametagValuer   r   r   r   r   r     sl    8 $$Q')**1- ,,Q/  #&**1-""1%(r   r   c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      r	Sr
g)r   i  aN  This message defines attributes for a node that handles a network
request. The node can be either a service or an application that sends,
forwards, or receives the request. Service peers should fill in `principal`
and `labels` as appropriate.

Fields:
  ip: The IPv4 or IPv6 address of the peer.
  port: The network port of the peer.
r   r   r   N)r   r   r   r   r   r   r   ipr   portr   r   r   r   r   r     s)     Q"				"$r   r   c                       \ rS rSrSr\R                  " S5      r\R                  " SSS9r\R                  " SSS9r	Sr
g	)
r   i  a'  This message defines attributes for an HTTP request. If the actual
request is not an HTTP request, the runtime system should try to map the
actual request to an equivalent HTTP request.

Fields:
  receiveTime: Optional. The timestamp when the destination service receives
    the first byte of the request.
  satisfiedAccessLevels: Optional. The information for access levels that
    are satisfied for the given access tuple.
  unsatisfiedAccessLevels: Optional. The information for access levels that
    are unsatisfied for the given access tuple.
r   r   Tr#   rE   r   N)r   r   r   r   r   r   r   receiveTimesatisfiedAccessLevelsunsatisfiedAccessLevelsr   r   r   r   r   r     s?     %%a(+#//DA%11!dCr   r   c                       \ rS rSrSr\R                  " S5      r\R                  " S5      r\R                  " S5      r	Sr
g)r   i  a  Core attributes for a resource. A resource is an addressable (named)
entity provided by the destination service. For example, a Compute Engine
instance.

Fields:
  name: The stable identifier (name) of a resource on the `service`. A
    resource can be logically identified as
    `//{resource.service}/{resource.name}`. Unlike the resource URI, the
    resource name doesn't contain any protocol and version information. For
    a list of full resource name formats, see
    https://cloud.google.com/iam/help/troubleshooter/full-resource-names
  service: The name of the service that this resource belongs to, such as
    `compute.googleapis.com`. The service name might not match the DNS
    hostname that actually serves the request. For a full list of resource
    service values, see
    https://cloud.google.com/iam/help/conditions/resource-services
  type: The type of the resource, in the format `{service}/{kind}`. For a
    full list of resource type values, see
    https://cloud.google.com/iam/help/conditions/resource-types
r   r   rE   r   N)r   r   r   r   r   r   r   nameservicer   r   r   r   r   r   r     s9    * 
		q	!$!!!$'			q	!$r   r   c                       \ rS rSrSr\R                  " SSSS9r\R                  " SSSS9r\R                  " S	S
5      r	Sr
g)r   i  a{  Explanation for how a condition affects a principal's access

Fields:
  errors: Any errors that prevented complete evaluation of the condition
    expression.
  evaluationStates: The value of each statement of the condition expression.
    The value can be `true`, `false`, or `null`. The value is `null` if the
    statement can't be evaluated.
  value: Value of the condition.
GoogleRpcStatusr   Tr#   LGoogleCloudPolicytroubleshooterIamV3alphaConditionExplanationEvaluationStater   r=   rE   r   N)r   r   r   r   r   r   r%   errorsevaluationStatesr   r   r   r   r   r   r     sP    	 !!"3QF&++,z|}  IM  N

 
 !8!
<%r   r   c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " SSSS9r\R                  " S	\R                  R                  S9r\R                  " S
S5      rSrg)r  i&  a  Evaluated state of a condition expression.

Fields:
  end: End position of an expression in the condition, by character, end
    included, for example: the end position of the first part of `a==b ||
    c==d` would be 4.
  errors: Any errors that prevented complete evaluation of the condition
    expression.
  start: Start position of an expression in the condition, by character.
  value: Value of this expression.
r   r   r  r   Tr#   rE   r=   rF   r   N)r   r   r   r   r   r   r   r   r   endr%   r  startr   r   r   r   r   r  r  &  sm    
 	q)*;*;*A*AB#!!"3QF&

 
 I,=,=,C,C
D%

 
 !8!
<%r   r  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS	S
S9r\R                  " S5      r\R                  " SS5      rSrg)>GoogleCloudPolicytroubleshooterIamV3alphaDenyPolicyExplanationi9  at  Details about how the relevant IAM deny policies affect the final access
state.

Enums:
  DenyAccessStateValueValuesEnum: Indicates whether the principal is denied
    the specified permission for the specified resource, based on evaluating
    all applicable IAM deny policies.
  RelevanceValueValuesEnum: The relevance of the deny policy result to the
    overall access state.

Fields:
  denyAccessState: Indicates whether the principal is denied the specified
    permission for the specified resource, based on evaluating all
    applicable IAM deny policies.
  explainedResources: List of resources with IAM deny policies that were
    evaluated to check the principal's denied permissions, with annotations
    to indicate how each policy contributed to the final result. The list of
    resources includes the policy for the resource itself, as well as
    policies that are inherited from higher levels of the resource
    hierarchy, including the organization, the folder, and the project. The
    order of the resources starts from the resource and climbs up the
    resource hierarchy. To learn more about the resource hierarchy, see
    https://cloud.google.com/iam/help/resource-hierarchy.
  permissionDeniable: Indicates whether the permission to troubleshoot is
    supported in deny policies.
  relevance: The relevance of the deny policy result to the overall access
    state.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
]GoogleCloudPolicytroubleshooterIamV3alphaDenyPolicyExplanation.DenyAccessStateValueValuesEnumiW  aY  Indicates whether the principal is denied the specified permission for
the specified resource, based on evaluating all applicable IAM deny
policies.

Values:
  DENY_ACCESS_STATE_UNSPECIFIED: Not specified.
  DENY_ACCESS_STATE_DENIED: The deny policy denies the principal the
    permission.
  DENY_ACCESS_STATE_NOT_DENIED: The deny policy doesn't deny the principal
    the permission.
  DENY_ACCESS_STATE_UNKNOWN_CONDITIONAL: The deny policy denies the
    principal the permission if a condition expression evaluates to
    `true`. However, the sender of the request didn't provide enough
    context for Policy Troubleshooter to evaluate the condition
    expression.
  DENY_ACCESS_STATE_UNKNOWN_INFO: The sender of the request does not have
    access to all of the deny policies that Policy Troubleshooter needs to
    evaluate the principal's access.
r   r   r   rE   rF   r   Nr   r   r   r   r   DENY_ACCESS_STATE_UNSPECIFIEDDENY_ACCESS_STATE_DENIEDDENY_ACCESS_STATE_NOT_DENIED%DENY_ACCESS_STATE_UNKNOWN_CONDITIONALDENY_ACCESS_STATE_UNKNOWN_INFOr   r   r   r   DenyAccessStateValueValuesEnumr  W  s'    & %&! #$ ,-)%&"r   r!  c                   $    \ rS rSrSrSrSrSrSrg)WGoogleCloudPolicytroubleshooterIamV3alphaDenyPolicyExplanation.RelevanceValueValuesEnumiq  a  The relevance of the deny policy result to the overall access state.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r#  q  r   r   r   r   >GoogleCloudPolicytroubleshooterIamV3alphaExplainedDenyResourcer   Tr#   rE   rF   r   N)r   r   r   r   r   r   rO   r!  r   r[   denyAccessStater%   explainedResourcesrQ   permissionDeniabler   r   r   r   r   r  r  9  s    :'y~~ '4! !  ''(H!L/ --.npq  }A  B --a0!!"<a@)r   r  c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\	R                  " S5       " S S	\R                  5      5       r\	R                  " S5       " S
 S\R                  5      5       r\	R                  " S5       " S S\R                  5      5       r\	R                  " S5       " S S\R                  5      5       r\R                   " SS5      r\R                   " SS5      r\R                   " SS5      r\R                   " SS5      r\R                   " SS5      r\R                   " SS5      r\R                   " S	S5      r\R                   " SS5      r\R2                  " SS5      r\R                   " SS5      r\R                   " SS5      r\R2                  " SS5      rS rg!)"<GoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationi  aG  Details about how a deny rule in a deny policy affects a principal's
ability to use a permission.

Enums:
  DenyAccessStateValueValuesEnum: Required. Indicates whether _this rule_
    denies the specified permission to the specified principal for the
    specified resource. This field does _not_ indicate whether the principal
    is actually denied on the permission for the resource. There might be
    another rule that overrides this rule. To determine whether the
    principal actually has the permission, use the `overall_access_state`
    field in the TroubleshootIamPolicyResponse.
  RelevanceValueValuesEnum: The relevance of this role binding to the
    overall determination for the entire policy.

Messages:
  DeniedPermissionsValue: Lists all denied permissions in the deny rule and
    indicates whether each permission matches the permission in the request.
    Each key identifies a denied permission in the rule, and each value
    indicates whether the denied permission matches the permission in the
    request.
  DeniedPrincipalsValue: Lists all denied principals in the deny rule and
    indicates whether each principal matches the principal in the request,
    either directly or through membership in a principal set. Each key
    identifies a denied principal in the rule, and each value indicates
    whether the denied principal matches the principal in the request.
  ExceptionPermissionsValue: Lists all exception permissions in the deny
    rule and indicates whether each permission matches the permission in the
    request. Each key identifies a exception permission in the rule, and
    each value indicates whether the exception permission matches the
    permission in the request.
  ExceptionPrincipalsValue: Lists all exception principals in the deny rule
    and indicates whether each principal matches the principal in the
    request, either directly or through membership in a principal set. Each
    key identifies a exception principal in the rule, and each value
    indicates whether the exception principal matches the principal in the
    request.

Fields:
  combinedDeniedPermission: Indicates whether the permission in the request
    is listed as a denied permission in the deny rule.
  combinedDeniedPrincipal: Indicates whether the principal is listed as a
    denied principal in the deny rule, either directly or through membership
    in a principal set.
  combinedExceptionPermission: Indicates whether the permission in the
    request is listed as an exception permission in the deny rule.
  combinedExceptionPrincipal: Indicates whether the principal is listed as
    an exception principal in the deny rule, either directly or through
    membership in a principal set.
  condition: A condition expression that specifies when the deny rule denies
    the principal access. To learn about IAM Conditions, see
    https://cloud.google.com/iam/help/conditions/overview.
  conditionExplanation: Condition evaluation state for this role binding.
  deniedPermissions: Lists all denied permissions in the deny rule and
    indicates whether each permission matches the permission in the request.
    Each key identifies a denied permission in the rule, and each value
    indicates whether the denied permission matches the permission in the
    request.
  deniedPrincipals: Lists all denied principals in the deny rule and
    indicates whether each principal matches the principal in the request,
    either directly or through membership in a principal set. Each key
    identifies a denied principal in the rule, and each value indicates
    whether the denied principal matches the principal in the request.
  denyAccessState: Required. Indicates whether _this rule_ denies the
    specified permission to the specified principal for the specified
    resource. This field does _not_ indicate whether the principal is
    actually denied on the permission for the resource. There might be
    another rule that overrides this rule. To determine whether the
    principal actually has the permission, use the `overall_access_state`
    field in the TroubleshootIamPolicyResponse.
  exceptionPermissions: Lists all exception permissions in the deny rule and
    indicates whether each permission matches the permission in the request.
    Each key identifies a exception permission in the rule, and each value
    indicates whether the exception permission matches the permission in the
    request.
  exceptionPrincipals: Lists all exception principals in the deny rule and
    indicates whether each principal matches the principal in the request,
    either directly or through membership in a principal set. Each key
    identifies a exception principal in the rule, and each value indicates
    whether the exception principal matches the principal in the request.
  relevance: The relevance of this role binding to the overall determination
    for the entire policy.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
[GoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.DenyAccessStateValueValuesEnumi  ap  Required. Indicates whether _this rule_ denies the specified
permission to the specified principal for the specified resource. This
field does _not_ indicate whether the principal is actually denied on the
permission for the resource. There might be another rule that overrides
this rule. To determine whether the principal actually has the permission,
use the `overall_access_state` field in the TroubleshootIamPolicyResponse.

Values:
  DENY_ACCESS_STATE_UNSPECIFIED: Not specified.
  DENY_ACCESS_STATE_DENIED: The deny policy denies the principal the
    permission.
  DENY_ACCESS_STATE_NOT_DENIED: The deny policy doesn't deny the principal
    the permission.
  DENY_ACCESS_STATE_UNKNOWN_CONDITIONAL: The deny policy denies the
    principal the permission if a condition expression evaluates to
    `true`. However, the sender of the request didn't provide enough
    context for Policy Troubleshooter to evaluate the condition
    expression.
  DENY_ACCESS_STATE_UNKNOWN_INFO: The sender of the request does not have
    access to all of the deny policies that Policy Troubleshooter needs to
    evaluate the principal's access.
r   r   r   rE   rF   r   Nr  r   r   r   r!  r+    s'    , %&! #$ ,-)%&"r   r!  c                   $    \ rS rSrSrSrSrSrSrg)UGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.RelevanceValueValuesEnumi  r   r   r   r   r   Nr   r   r   r   r   r-    r   r   r   r6   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
SGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.DeniedPermissionsValuei	  a  Lists all denied permissions in the deny rule and indicates whether
each permission matches the permission in the request. Each key identifies
a denied permission in the rule, and each value indicates whether the
denied permission matches the permission in the request.

Messages:
  AdditionalProperty: An additional property for a DeniedPermissionsValue
    object.

Fields:
  additionalProperties: Additional properties of type
    DeniedPermissionsValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)fGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.DeniedPermissionsValue.AdditionalPropertyi  zAn additional property for a DeniedPermissionsValue object.

Fields:
  key: Name of the additional property.
  value: A GoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationA
    nnotatedPermissionMatching attribute.
r   WGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationAnnotatedPermissionMatchingr   r   Nr>   r   r   r   r?   r1    4    
 !!!$c$$%~  AB  Cer   r?   r   Tr#   r   NrA   r   r   r   DeniedPermissionsValuer/  	  4    
CY.. 
C %112FTXYr   r4  c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
RGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.DeniedPrincipalsValuei'  a  Lists all denied principals in the deny rule and indicates whether
each principal matches the principal in the request, either directly or
through membership in a principal set. Each key identifies a denied
principal in the rule, and each value indicates whether the denied
principal matches the principal in the request.

Messages:
  AdditionalProperty: An additional property for a DeniedPrincipalsValue
    object.

Fields:
  additionalProperties: Additional properties of type
    DeniedPrincipalsValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)eGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.DeniedPrincipalsValue.AdditionalPropertyi8  zAn additional property for a DeniedPrincipalsValue object.

Fields:
  key: Name of the additional property.
  value: A GoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationA
    nnotatedDenyPrincipalMatching attribute.
r   ZGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationAnnotatedDenyPrincipalMatchingr   r   Nr>   r   r   r   r?   r9  8  7    
 !!!$c$$  &B  DE  Fer   r?   r   Tr#   r   NrA   r   r   r   DeniedPrincipalsValuer7  '  4    
FY.. 
F %112FTXYr   r<  c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
VGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.ExceptionPermissionsValueiF  a  Lists all exception permissions in the deny rule and indicates whether
each permission matches the permission in the request. Each key identifies
a exception permission in the rule, and each value indicates whether the
exception permission matches the permission in the request.

Messages:
  AdditionalProperty: An additional property for a
    ExceptionPermissionsValue object.

Fields:
  additionalProperties: Additional properties of type
    ExceptionPermissionsValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)iGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.ExceptionPermissionsValue.AdditionalPropertyiV  zAn additional property for a ExceptionPermissionsValue object.

Fields:
  key: Name of the additional property.
  value: A GoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationA
    nnotatedPermissionMatching attribute.
r   r2  r   r   Nr>   r   r   r   r?   rA  V  r3  r   r?   r   Tr#   r   NrA   r   r   r   ExceptionPermissionsValuer?  F  r5  r   rB  c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
UGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.ExceptionPrincipalsValueid  a
  Lists all exception principals in the deny rule and indicates whether
each principal matches the principal in the request, either directly or
through membership in a principal set. Each key identifies a exception
principal in the rule, and each value indicates whether the exception
principal matches the principal in the request.

Messages:
  AdditionalProperty: An additional property for a
    ExceptionPrincipalsValue object.

Fields:
  additionalProperties: Additional properties of type
    ExceptionPrincipalsValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)hGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanation.ExceptionPrincipalsValue.AdditionalPropertyiu  zAn additional property for a ExceptionPrincipalsValue object.

Fields:
  key: Name of the additional property.
  value: A GoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationA
    nnotatedDenyPrincipalMatching attribute.
r   r:  r   r   Nr>   r   r   r   r?   rF  u  r;  r   r?   r   Tr#   r   NrA   r   r   r   ExceptionPrincipalsValuerD  d  r=  r   rG  r2  r   r:  r   rE   rF   r   rG   r   rH   rI   rJ   rK   rL   rM   rN   r   N)r   r   r   r   r   r   rO   r!  r   r   rP   rB   r4  r<  rB  rG  r%   combinedDeniedPermissioncombinedDeniedPrincipalcombinedExceptionPermissioncombinedExceptionPrincipalr   r   deniedPermissionsdeniedPrincipalsr[   r%  exceptionPermissionsexceptionPrincipalsr   r   r   r   r   r)  r)    s   Qf'y~~ ':! !" !!"89Zy00 Z :Z: !!"89Zi// Z :Z< !!"89Z)"3"3 Z :Z: !!"89Z!2!2 Z :Z< '33  5N  PQ  R%22  4P  RS  T ) 6 6  8Q  ST  !U(55  7S  UV   W$$%5q9)"//0oqrs,,-EqI++,CQG''(H!L/"//0KRP!../I2N!!"<bA)r   r)  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS5      rS	rg
)r:  i  a  Details about whether the principal in the request is listed as a denied
principal in the deny rule, either directly or through membership in a
principal set.

Enums:
  MembershipValueValuesEnum: Indicates whether the principal is listed as a
    denied principal in the deny rule, either directly or through membership
    in a principal set.
  RelevanceValueValuesEnum: The relevance of the principal's status to the
    overall determination for the role binding.

Fields:
  membership: Indicates whether the principal is listed as a denied
    principal in the deny rule, either directly or through membership in a
    principal set.
  relevance: The relevance of the principal's status to the overall
    determination for the role binding.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
tGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationAnnotatedDenyPrincipalMatching.MembershipValueValuesEnumi  a  Indicates whether the principal is listed as a denied principal in the
deny rule, either directly or through membership in a principal set.

Values:
  MEMBERSHIP_MATCHING_STATE_UNSPECIFIED: Not specified.
  MEMBERSHIP_MATCHED: The principal in the request matches the principal
    in the policy. The principal can be included directly or indirectly: *
    A principal is included directly if that principal is listed in the
    role binding. * A principal is included indirectly if that principal
    is in a Google group, Google Workspace account, or Cloud Identity
    domain that is listed in the policy.
  MEMBERSHIP_NOT_MATCHED: The principal in the request doesn't match the
    principal in the policy.
  MEMBERSHIP_UNKNOWN_INFO: The principal in the policy is a group or
    domain, and the sender of the request doesn't have permission to view
    whether the principal in the request is a member of the group or
    domain.
  MEMBERSHIP_UNKNOWN_UNSUPPORTED: The principal is an unsupported type.
r   r   r   rE   rF   r   Nr   r   r   r   r   rR    s'    & -.)%&"r   r   c                   $    \ rS rSrSrSrSrSrSrg)sGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationAnnotatedDenyPrincipalMatching.RelevanceValueValuesEnumi  r   r   r   r   r   Nr   r   r   r   r   rT    r   r   r   r   r   r   Nr   r   r   r   r:  r:    sO    &').. '4! !" ""#>B*!!"<a@)r   r:  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS5      rS	rg
)r2  i  a  Details about whether the permission in the request is denied by the
deny rule.

Enums:
  PermissionMatchingStateValueValuesEnum: Indicates whether the permission
    in the request is denied by the deny rule.
  RelevanceValueValuesEnum: The relevance of the permission status to the
    overall determination for the rule.

Fields:
  permissionMatchingState: Indicates whether the permission in the request
    is denied by the deny rule.
  relevance: The relevance of the permission status to the overall
    determination for the rule.
c                   $    \ rS rSrSrSrSrSrSrg)~GoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationAnnotatedPermissionMatching.PermissionMatchingStateValueValuesEnumi  ae  Indicates whether the permission in the request is denied by the deny
rule.

Values:
  PERMISSION_PATTERN_MATCHING_STATE_UNSPECIFIED: Not specified.
  PERMISSION_PATTERN_MATCHED: The permission in the request matches the
    permission in the policy.
  PERMISSION_PATTERN_NOT_MATCHED: The permission in the request matches
    the permission in the policy.
r   r   r   r   N)	r   r   r   r   r   -PERMISSION_PATTERN_MATCHING_STATE_UNSPECIFIEDPERMISSION_PATTERN_MATCHEDPERMISSION_PATTERN_NOT_MATCHEDr   r   r   r   &PermissionMatchingStateValueValuesEnumrW    s    	 561!"%&"r   r[  c                   $    \ rS rSrSrSrSrSrSrg)pGoogleCloudPolicytroubleshooterIamV3alphaDenyRuleExplanationAnnotatedPermissionMatching.RelevanceValueValuesEnumi  a  The relevance of the permission status to the overall determination
for the rule.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r]    r   r   r   r   r   r   N)r   r   r   r   r   r   rO   r[  r   r[   permissionMatchingStater   r   r   r   r   r2  r2    sQ     'y~~ '! !" &//0XZ[\!!"<a@)r   r2  c                   &   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS	S
S9r\R                  " S5      r\R                  " SS5      r\R                  " SS5      rSrg)r   i	  aX	  Details about how a specific IAM allow policy contributed to the final
access state.

Enums:
  AllowAccessStateValueValuesEnum: Required. Indicates whether _this policy_
    provides the specified permission to the specified principal for the
    specified resource. This field does _not_ indicate whether the principal
    actually has the permission for the resource. There might be another
    policy that overrides this policy. To determine whether the principal
    actually has the permission, use the `overall_access_state` field in the
    TroubleshootIamPolicyResponse.
  RelevanceValueValuesEnum: The relevance of this policy to the overall
    access state in the TroubleshootIamPolicyResponse. If the sender of the
    request does not have access to the policy, this field is omitted.

Fields:
  allowAccessState: Required. Indicates whether _this policy_ provides the
    specified permission to the specified principal for the specified
    resource. This field does _not_ indicate whether the principal actually
    has the permission for the resource. There might be another policy that
    overrides this policy. To determine whether the principal actually has
    the permission, use the `overall_access_state` field in the
    TroubleshootIamPolicyResponse.
  bindingExplanations: Details about how each role binding in the policy
    affects the principal's ability, or inability, to use the permission for
    the resource. The order of the role bindings matches the role binding
    order in the policy. If the sender of the request does not have access
    to the policy, this field is omitted.
  fullResourceName: The full resource name that identifies the resource. For
    example, `//compute.googleapis.com/projects/my-project/zones/us-
    central1-a/instances/my-instance`. If the sender of the request does not
    have access to the policy, this field is omitted. For examples of full
    resource names for Google Cloud services, see
    https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
  policy: The IAM allow policy attached to the resource. If the sender of
    the request does not have access to the policy, this field is empty.
  relevance: The relevance of this policy to the overall access state in the
    TroubleshootIamPolicyResponse. If the sender of the request does not
    have access to the policy, this field is omitted.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
]GoogleCloudPolicytroubleshooterIamV3alphaExplainedAllowPolicy.AllowAccessStateValueValuesEnumi3  ar  Required. Indicates whether _this policy_ provides the specified
permission to the specified principal for the specified resource. This
field does _not_ indicate whether the principal actually has the
permission for the resource. There might be another policy that overrides
this policy. To determine whether the principal actually has the
permission, use the `overall_access_state` field in the
TroubleshootIamPolicyResponse.

Values:
  ALLOW_ACCESS_STATE_UNSPECIFIED: Not specified.
  ALLOW_ACCESS_STATE_GRANTED: The allow policy gives the principal the
    permission.
  ALLOW_ACCESS_STATE_NOT_GRANTED: The allow policy doesn't give the
    principal the permission.
  ALLOW_ACCESS_STATE_UNKNOWN_CONDITIONAL: The allow policy gives the
    principal the permission if a condition expression evaluate to `true`.
    However, the sender of the request didn't provide enough context for
    Policy Troubleshooter to evaluate the condition expression.
  ALLOW_ACCESS_STATE_UNKNOWN_INFO: The sender of the request doesn't have
    access to all of the allow policies that Policy Troubleshooter needs
    to evaluate the principal's access.
r   r   r   rE   rF   r   Nr   r   r   r   r   ra  3  r   r   r   c                   $    \ rS rSrSrSrSrSrSrg)VGoogleCloudPolicytroubleshooterIamV3alphaExplainedAllowPolicy.RelevanceValueValuesEnumiP  1  The relevance of this policy to the overall access state in the
TroubleshootIamPolicyResponse. If the sender of the request does not have
access to the policy, this field is omitted.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   rc  P       '(#!" r   r   r   r   r   Tr#   rE   GoogleIamV1PolicyrF   rG   r   N)r   r   r   r   r   r   rO   r   r   r[   r   r%   bindingExplanationsr   r   policyr   r   r   r   r   r   r   	  s    'R(	 (:! !$ (()JAN!../qst  @D  E**1-!!"5q9&!!"<a@)r   r   c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS	5      r\R                  " SS
5      r\R                  " SSSS9rSrg)<GoogleCloudPolicytroubleshooterIamV3alphaExplainedDenyPolicyii  a  Details about how a specific IAM deny policy Policy contributed to the
access check.

Enums:
  DenyAccessStateValueValuesEnum: Required. Indicates whether _this policy_
    denies the specified permission to the specified principal for the
    specified resource. This field does _not_ indicate whether the principal
    actually has the permission for the resource. There might be another
    policy that overrides this policy. To determine whether the principal
    actually has the permission, use the `overall_access_state` field in the
    TroubleshootIamPolicyResponse.
  RelevanceValueValuesEnum: The relevance of this policy to the overall
    access state in the TroubleshootIamPolicyResponse. If the sender of the
    request does not have access to the policy, this field is omitted.

Fields:
  denyAccessState: Required. Indicates whether _this policy_ denies the
    specified permission to the specified principal for the specified
    resource. This field does _not_ indicate whether the principal actually
    has the permission for the resource. There might be another policy that
    overrides this policy. To determine whether the principal actually has
    the permission, use the `overall_access_state` field in the
    TroubleshootIamPolicyResponse.
  policy: The IAM deny policy attached to the resource. If the sender of the
    request does not have access to the policy, this field is omitted.
  relevance: The relevance of this policy to the overall access state in the
    TroubleshootIamPolicyResponse. If the sender of the request does not
    have access to the policy, this field is omitted.
  ruleExplanations: Details about how each rule in the policy affects the
    principal's inability to use the permission for the resource. The order
    of the deny rule matches the order of the rules in the deny policy. If
    the sender of the request does not have access to the policy, this field
    is omitted.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
[GoogleCloudPolicytroubleshooterIamV3alphaExplainedDenyPolicy.DenyAccessStateValueValuesEnumi  am  Required. Indicates whether _this policy_ denies the specified
permission to the specified principal for the specified resource. This
field does _not_ indicate whether the principal actually has the
permission for the resource. There might be another policy that overrides
this policy. To determine whether the principal actually has the
permission, use the `overall_access_state` field in the
TroubleshootIamPolicyResponse.

Values:
  DENY_ACCESS_STATE_UNSPECIFIED: Not specified.
  DENY_ACCESS_STATE_DENIED: The deny policy denies the principal the
    permission.
  DENY_ACCESS_STATE_NOT_DENIED: The deny policy doesn't deny the principal
    the permission.
  DENY_ACCESS_STATE_UNKNOWN_CONDITIONAL: The deny policy denies the
    principal the permission if a condition expression evaluates to
    `true`. However, the sender of the request didn't provide enough
    context for Policy Troubleshooter to evaluate the condition
    expression.
  DENY_ACCESS_STATE_UNKNOWN_INFO: The sender of the request does not have
    access to all of the deny policies that Policy Troubleshooter needs to
    evaluate the principal's access.
r   r   r   rE   rF   r   Nr  r   r   r   r!  rl    '    . %&! #$ ,-)%&"r   r!  c                   $    \ rS rSrSrSrSrSrSrg)UGoogleCloudPolicytroubleshooterIamV3alphaExplainedDenyPolicy.RelevanceValueValuesEnumi  rd  r   r   r   r   Nr   r   r   r   r   ro    re  r   r   r   GoogleIamV2Policyr   rE   r)  rF   Tr#   r   N)r   r   r   r   r   r   rO   r!  r   r[   r%  r%   rh  r   ruleExplanationsr   r   r   r   rj  rj  i  s{    !F'y~~ '<! !$ ''(H!L/!!"5q9&!!"<a@)++,jlmx|}r   rj  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS	S
S9r\R                  " S5      r\R                  " SS5      rSrg)r$  i  a\  Details about how a specific resource contributed to the deny policy
evaluation.

Enums:
  DenyAccessStateValueValuesEnum: Required. Indicates whether any policies
    attached to _this resource_ deny the specific permission to the
    specified principal for the specified resource. This field does _not_
    indicate whether the principal actually has the permission for the
    resource. There might be another policy that overrides this policy. To
    determine whether the principal actually has the permission, use the
    `overall_access_state` field in the TroubleshootIamPolicyResponse.
  RelevanceValueValuesEnum: The relevance of this policy to the overall
    access state in the TroubleshootIamPolicyResponse. If the sender of the
    request does not have access to the policy, this field is omitted.

Fields:
  denyAccessState: Required. Indicates whether any policies attached to
    _this resource_ deny the specific permission to the specified principal
    for the specified resource. This field does _not_ indicate whether the
    principal actually has the permission for the resource. There might be
    another policy that overrides this policy. To determine whether the
    principal actually has the permission, use the `overall_access_state`
    field in the TroubleshootIamPolicyResponse.
  explainedPolicies: List of IAM deny policies that were evaluated to check
    the principal's denied permissions, with annotations to indicate how
    each policy contributed to the final result.
  fullResourceName: The full resource name that identifies the resource. For
    example, `//compute.googleapis.com/projects/my-project/zones/us-
    central1-a/instances/my-instance`. If the sender of the request does not
    have access to the policy, this field is omitted. For examples of full
    resource names for Google Cloud services, see
    https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
  relevance: The relevance of this policy to the overall access state in the
    TroubleshootIamPolicyResponse. If the sender of the request does not
    have access to the policy, this field is omitted.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
]GoogleCloudPolicytroubleshooterIamV3alphaExplainedDenyResource.DenyAccessStateValueValuesEnumi  a  Required. Indicates whether any policies attached to _this resource_
deny the specific permission to the specified principal for the specified
resource. This field does _not_ indicate whether the principal actually
has the permission for the resource. There might be another policy that
overrides this policy. To determine whether the principal actually has the
permission, use the `overall_access_state` field in the
TroubleshootIamPolicyResponse.

Values:
  DENY_ACCESS_STATE_UNSPECIFIED: Not specified.
  DENY_ACCESS_STATE_DENIED: The deny policy denies the principal the
    permission.
  DENY_ACCESS_STATE_NOT_DENIED: The deny policy doesn't deny the principal
    the permission.
  DENY_ACCESS_STATE_UNKNOWN_CONDITIONAL: The deny policy denies the
    principal the permission if a condition expression evaluates to
    `true`. However, the sender of the request didn't provide enough
    context for Policy Troubleshooter to evaluate the condition
    expression.
  DENY_ACCESS_STATE_UNKNOWN_INFO: The sender of the request does not have
    access to all of the deny policies that Policy Troubleshooter needs to
    evaluate the principal's access.
r   r   r   rE   rF   r   Nr  r   r   r   r!  rt    rm  r   r!  c                   $    \ rS rSrSrSrSrSrSrg)WGoogleCloudPolicytroubleshooterIamV3alphaExplainedDenyResource.RelevanceValueValuesEnumi  rd  r   r   r   r   Nr   r   r   r   r   rv    re  r   r   r   rj  r   Tr#   rE   rF   r   N)r   r   r   r   r   r   rO   r!  r   r[   r%  r%   r   r   r   r   r   r   r   r   r$  r$    sy    #J'y~~ '<! !$ ''(H!L/,,-kmny}~**1-!!"<a@)r   r$  c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS	5      r\R                  " S
S5      r\R                  " SS5      rSrg)EGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABBindingAndPolicyi  aO  Details about how a principal access boundary binding and policy
contributes to the principal access boundary explanation, with annotations
to indicate how the binding and policy contribute to the overall access
state.

Enums:
  BindingAndPolicyAccessStateValueValuesEnum: Output only. Indicates whether
    the principal is allowed to access the specified resource based on
    evaluating the binding and policy.
  RelevanceValueValuesEnum: The relevance of this principal access boundary
    binding and policy to the overall access state.

Fields:
  bindingAndPolicyAccessState: Output only. Indicates whether the principal
    is allowed to access the specified resource based on evaluating the
    binding and policy.
  explainedPolicy: Optional. Details about how this policy contributes to
    the principal access boundary explanation, with annotations to indicate
    how the policy contributes to the overall access state. If the caller
    doesn't have permission to view the policy in the binding, this field is
    omitted.
  explainedPolicyBinding: Details about how this binding contributes to the
    principal access boundary explanation, with annotations to indicate how
    the binding contributes to the overall access state.
  relevance: The relevance of this principal access boundary binding and
    policy to the overall access state.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
pGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABBindingAndPolicy.BindingAndPolicyAccessStateValueValuesEnumi<  a*  Output only. Indicates whether the principal is allowed to access the
specified resource based on evaluating the binding and policy.

Values:
  PAB_ACCESS_STATE_UNSPECIFIED: Not specified.
  PAB_ACCESS_STATE_ALLOWED: The PAB component allows the principal's
    access to the specified resource.
  PAB_ACCESS_STATE_NOT_ALLOWED: The PAB component doesn't allow the
    principal's access to the specified resource.
  PAB_ACCESS_STATE_NOT_ENFORCED: The PAB component is not enforced on the
    principal, or the specified resource. This state refers to the
    following scenarios: - IAM doesn't enforce the specified permission at
    the PAB policy's [enforcement
    version](https://cloud.google.com/iam/help/pab/enforcement-versions),
    so the PAB policy can't block access. - The binding doesn't apply to
    the principal, so the policy is not enforced. - The PAB policy doesn't
    have any rules
  PAB_ACCESS_STATE_UNKNOWN_INFO: The sender of the request does not have
    access to the PAB component, or the relevant data to explain the PAB
    component.
r   r   r   rE   rF   r   Nr   r   r   r   r   PAB_ACCESS_STATE_UNSPECIFIEDPAB_ACCESS_STATE_ALLOWEDPAB_ACCESS_STATE_NOT_ALLOWEDPAB_ACCESS_STATE_NOT_ENFORCEDPAB_ACCESS_STATE_UNKNOWN_INFOr   r   r   r   *BindingAndPolicyAccessStateValueValuesEnumrz  <  '    * $%  #$ $%!$%!r   r  c                   $    \ rS rSrSrSrSrSrSrg)^GoogleCloudPolicytroubleshooterIamV3alphaExplainedPABBindingAndPolicy.RelevanceValueValuesEnumiX  a  The relevance of this principal access boundary binding and policy to
the overall access state.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r  X  r   r   r   r   ;GoogleCloudPolicytroubleshooterIamV3alphaExplainedPABPolicyr   ?GoogleCloudPolicytroubleshooterIamV3alphaExplainedPolicyBindingrE   rF   r   N)r   r   r   r   r   r   rO   r  r   r[   bindingAndPolicyAccessStater%   explainedPolicyexplainedPolicyBindingr   r   r   r   r   rx  rx    sz    8&9>> &8! !" !* 3 34`bc d**+hjkl/$112suvw!!"<a@)r   rx  c                   (   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SSS	S
9r
\R                  " SS5      r\R                  " SS5      r\R                  " SS5      r\R                  " SS5      rSrg)r  io  a  Details about how a principal access boundary policy contributes to the
explanation, with annotations to indicate how the policy contributes to the
overall access state.

Enums:
  PolicyAccessStateValueValuesEnum: Output only. Indicates whether the
    policy allows access to the specified resource.
  RelevanceValueValuesEnum: The relevance of this policy to the overall
    access state.

Fields:
  explainedRules: List of principal access boundary rules that were
    explained to check the principal's access to specified resource, with
    annotations to indicate how each rule contributes to the overall access
    state.
  policy: The policy that is explained.
  policyAccessState: Output only. Indicates whether the policy allows access
    to the specified resource.
  policyVersion: Output only. Explanation of the principal access boundary
    policy's version.
  relevance: The relevance of this policy to the overall access state.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
\GoogleCloudPolicytroubleshooterIamV3alphaExplainedPABPolicy.PolicyAccessStateValueValuesEnumi  a  Output only. Indicates whether the policy allows access to the
specified resource.

Values:
  PAB_ACCESS_STATE_UNSPECIFIED: Not specified.
  PAB_ACCESS_STATE_ALLOWED: The PAB component allows the principal's
    access to the specified resource.
  PAB_ACCESS_STATE_NOT_ALLOWED: The PAB component doesn't allow the
    principal's access to the specified resource.
  PAB_ACCESS_STATE_NOT_ENFORCED: The PAB component is not enforced on the
    principal, or the specified resource. This state refers to the
    following scenarios: - IAM doesn't enforce the specified permission at
    the PAB policy's [enforcement
    version](https://cloud.google.com/iam/help/pab/enforcement-versions),
    so the PAB policy can't block access. - The binding doesn't apply to
    the principal, so the policy is not enforced. - The PAB policy doesn't
    have any rules
  PAB_ACCESS_STATE_UNKNOWN_INFO: The sender of the request does not have
    access to the PAB component, or the relevant data to explain the PAB
    component.
r   r   r   rE   rF   r   Nr{  r   r   r    PolicyAccessStateValueValuesEnumr    r  r   r  c                   $    \ rS rSrSrSrSrSrSrg)TGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABPolicy.RelevanceValueValuesEnumi  a  The relevance of this policy to the overall access state.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r    r   r   r   9GoogleCloudPolicytroubleshooterIamV3alphaExplainedPABRuler   Tr#   (GoogleIamV3PrincipalAccessBoundaryPolicyr   rE   BGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABPolicyVersionrF   rG   r   N)r   r   r   r   r   r   rO   r  r   r%   explainedRulesrh  r[   policyAccessStatepolicyVersionr   r   r   r   r   r  r  o  s    .& &8! !  ))*eghswx.!!"LaP&))*LaP(()mopq-!!"<a@)r   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " S\R                  R                  S9rSrg	)
r  i  a8  Details about how a principal access boundary policy's version
contributes to the policy's enforcement state.

Enums:
  EnforcementStateValueValuesEnum: Output only. Indicates whether the policy
    is enforced based on its version.

Fields:
  enforcementState: Output only. Indicates whether the policy is enforced
    based on its version.
  version: Output only. The actual version of the policy. - If the policy
    uses static version, this field is the chosen static version. - If the
    policy uses dynamic version, this field is the effective latest version.
c                   $    \ rS rSrSrSrSrSrSrg)bGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABPolicyVersion.EnforcementStateValueValuesEnumi  a  Output only. Indicates whether the policy is enforced based on its
version.

Values:
  PAB_POLICY_ENFORCEMENT_STATE_UNSPECIFIED: An error occurred when
    checking whether a principal access boundary policy is enforced based
    on its version.
  PAB_POLICY_ENFORCEMENT_STATE_ENFORCED: The principal access boundary
    policy is enforced based on its version.
  PAB_POLICY_ENFORCEMENT_STATE_NOT_ENFORCED: The principal access boundary
    policy is not enforced based on its version.
r   r   r   r   N)	r   r   r   r   r   (PAB_POLICY_ENFORCEMENT_STATE_UNSPECIFIED%PAB_POLICY_ENFORCEMENT_STATE_ENFORCED)PAB_POLICY_ENFORCEMENT_STATE_NOT_ENFORCEDr   r   r   r   EnforcementStateValueValuesEnumr    s     01,,-)01-r   r  r   r   r   r   N)r   r   r   r   r   r   rO   r  r[   enforcementStater   r   r   versionr   r   r   r   r  r    sK    2	 2" (()JAN""1i.?.?.E.EF'r   r  c                   |   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r	 " S	 S
\R                  5      r
\R                  " SS5      r\R                  " SS5      r\R                  " SSSS9r\R                  " SS5      r\R                  " S
S5      rSrg)r  i  a  Details about how a principal access boundary rule contributes to the
explanation, with annotations to indicate how the rule contributes to the
overall access state.

Enums:
  CombinedResourceInclusionStateValueValuesEnum: Output only. Indicates
    whether any resource of the rule is the specified resource or includes
    the specified resource.
  EffectValueValuesEnum: Required. The effect of the rule which describes
    the access relationship.
  RelevanceValueValuesEnum: The relevance of this rule to the overall access
    state.
  RuleAccessStateValueValuesEnum: Output only. Indicates whether the rule
    allows access to the specified resource.

Fields:
  combinedResourceInclusionState: Output only. Indicates whether any
    resource of the rule is the specified resource or includes the specified
    resource.
  effect: Required. The effect of the rule which describes the access
    relationship.
  explainedResources: List of resources that were explained to check the
    principal's access to specified resource, with annotations to indicate
    how each resource contributes to the overall access state.
  relevance: The relevance of this rule to the overall access state.
  ruleAccessState: Output only. Indicates whether the rule allows access to
    the specified resource.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
gGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABRule.CombinedResourceInclusionStateValueValuesEnumi  a  Output only. Indicates whether any resource of the rule is the
specified resource or includes the specified resource.

Values:
  RESOURCE_INCLUSION_STATE_UNSPECIFIED: An error occurred when checking
    whether the resource includes the specified resource.
  RESOURCE_INCLUSION_STATE_INCLUDED: The resource includes the specified
    resource.
  RESOURCE_INCLUSION_STATE_NOT_INCLUDED: The resource doesn't include the
    specified resource.
  RESOURCE_INCLUSION_STATE_UNKNOWN_INFO: The sender of the request does
    not have access to the relevant data to check whether the resource
    includes the specified resource.
  RESOURCE_INCLUSION_STATE_UNKNOWN_UNSUPPORTED: The resource is of an
    unsupported type, such as non-CRM resources.
r   r   r   rE   rF   r   Nr   r   r   r   r   $RESOURCE_INCLUSION_STATE_UNSPECIFIED!RESOURCE_INCLUSION_STATE_INCLUDED%RESOURCE_INCLUSION_STATE_NOT_INCLUDED%RESOURCE_INCLUSION_STATE_UNKNOWN_INFO,RESOURCE_INCLUSION_STATE_UNKNOWN_UNSUPPORTEDr   r   r   r   -CombinedResourceInclusionStateValueValuesEnumr    '      ,-(()%,-),-)340r   r  c                        \ rS rSrSrSrSrSrg)OGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABRule.EffectValueValuesEnumi  zRequired. The effect of the rule which describes the access
relationship.

Values:
  EFFECT_UNSPECIFIED: Effect unspecified.
  ALLOW: Allows access to the resources in this rule.
r   r   r   Nr   r   r   r   r   EFFECT_UNSPECIFIEDALLOWr   r   r   r   EffectValueValuesEnumr         Er   r  c                   $    \ rS rSrSrSrSrSrSrg)RGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABRule.RelevanceValueValuesEnumi  a  The relevance of this rule to the overall access state.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r    r   r   r   c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
XGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABRule.RuleAccessStateValueValuesEnumi/  a  Output only. Indicates whether the rule allows access to the specified
resource.

Values:
  PAB_ACCESS_STATE_UNSPECIFIED: Not specified.
  PAB_ACCESS_STATE_ALLOWED: The PAB component allows the principal's
    access to the specified resource.
  PAB_ACCESS_STATE_NOT_ALLOWED: The PAB component doesn't allow the
    principal's access to the specified resource.
  PAB_ACCESS_STATE_NOT_ENFORCED: The PAB component is not enforced on the
    principal, or the specified resource. This state refers to the
    following scenarios: - IAM doesn't enforce the specified permission at
    the PAB policy's [enforcement
    version](https://cloud.google.com/iam/help/pab/enforcement-versions),
    so the PAB policy can't block access. - The binding doesn't apply to
    the principal, so the policy is not enforced. - The PAB policy doesn't
    have any rules
  PAB_ACCESS_STATE_UNKNOWN_INFO: The sender of the request does not have
    access to the PAB component, or the relevant data to explain the PAB
    component.
r   r   r   rE   rF   r   Nr{  r   r   r   RuleAccessStateValueValuesEnumr  /  r  r   r  r   r   JGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABRuleExplainedResourcerE   Tr#   rF   rG   r   N)r   r   r   r   r   r   rO   r  r  r   r  r[   combinedResourceInclusionStateeffectr%   r&  r   ruleAccessStater   r   r   r   r  r    s    :5inn 5.	inn 	! ! &y~~ &8 $-#6#67fhi#j 6:& --.z|}  IM  N!!"<a@)''(H!L/r   r  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " S5      r\R                  " SS	5      rS
rg)r  iR  a]  Details about how a resource contributes to the explanation, with
annotations to indicate how the resource contributes to the overall access
state.

Enums:
  RelevanceValueValuesEnum: The relevance of this resource to the overall
    access state.
  ResourceInclusionStateValueValuesEnum: Output only. Indicates whether the
    resource is the specified resource or includes the specified resource.

Fields:
  relevance: The relevance of this resource to the overall access state.
  resource: The [full resource name](https://cloud.google.com/iam/docs/full-
    resource-names) that identifies the resource that is explained. This can
    only be a project, a folder, or an organization which is what a PAB rule
    accepts.
  resourceInclusionState: Output only. Indicates whether the resource is the
    specified resource or includes the specified resource.
c                   $    \ rS rSrSrSrSrSrSrg)cGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABRuleExplainedResource.RelevanceValueValuesEnumig  a  The relevance of this resource to the overall access state.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r  g  r   r   r   c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
pGoogleCloudPolicytroubleshooterIamV3alphaExplainedPABRuleExplainedResource.ResourceInclusionStateValueValuesEnumiw  a  Output only. Indicates whether the resource is the specified resource
or includes the specified resource.

Values:
  RESOURCE_INCLUSION_STATE_UNSPECIFIED: An error occurred when checking
    whether the resource includes the specified resource.
  RESOURCE_INCLUSION_STATE_INCLUDED: The resource includes the specified
    resource.
  RESOURCE_INCLUSION_STATE_NOT_INCLUDED: The resource doesn't include the
    specified resource.
  RESOURCE_INCLUSION_STATE_UNKNOWN_INFO: The sender of the request does
    not have access to the relevant data to check whether the resource
    includes the specified resource.
  RESOURCE_INCLUSION_STATE_UNKNOWN_UNSUPPORTED: The resource is of an
    unsupported type, such as non-CRM resources.
r   r   r   rE   rF   r   Nr  r   r   r   %ResourceInclusionStateValueValuesEnumr  w  r  r   r  r   r   rE   r   N)r   r   r   r   r   r   rO   r   r  r[   r   r   r   resourceInclusionStater   r   r   r   r  r  R  sa    (! ! 5inn 5. !!"<a@)""1%($../VXYZr   r  c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " S	S
5      r\R                  " SS5      r\R                  " SS5      rSrg)r  i  a  Details about how a policy binding contributes to the policy
explanation, with annotations to indicate how the policy binding contributes
to the overall access state.

Enums:
  PolicyBindingStateValueValuesEnum: Output only. Indicates whether the
    policy binding takes effect.
  RelevanceValueValuesEnum: The relevance of this policy binding to the
    overall access state.

Fields:
  conditionExplanation: Optional. Explanation of the condition in the policy
    binding. If the policy binding doesn't have a condition, this field is
    omitted.
  policyBinding: The policy binding that is explained.
  policyBindingState: Output only. Indicates whether the policy binding
    takes effect.
  relevance: The relevance of this policy binding to the overall access
    state.
c                   $    \ rS rSrSrSrSrSrSrg)aGoogleCloudPolicytroubleshooterIamV3alphaExplainedPolicyBinding.PolicyBindingStateValueValuesEnumi  aC  Output only. Indicates whether the policy binding takes effect.

Values:
  POLICY_BINDING_STATE_UNSPECIFIED: An error occurred when checking
    whether the policy binding is enforced.
  POLICY_BINDING_STATE_ENFORCED: The policy binding is enforced.
  POLICY_BINDING_STATE_NOT_ENFORCED: The policy binding is not enforced.
r   r   r   r   N)	r   r   r   r   r    POLICY_BINDING_STATE_UNSPECIFIEDPOLICY_BINDING_STATE_ENFORCED!POLICY_BINDING_STATE_NOT_ENFORCEDr   r   r   r   !PolicyBindingStateValueValuesEnumr    s     ()$$%!()%r   r  c                   $    \ rS rSrSrSrSrSrSrg)XGoogleCloudPolicytroubleshooterIamV3alphaExplainedPolicyBinding.RelevanceValueValuesEnumi  a  The relevance of this policy binding to the overall access state.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r    r   r   r   r   r   GoogleIamV3PolicyBindingr   rE   rF   r   N)r   r   r   r   r   r   rO   r  r   r%   r   policyBindingr[   policyBindingStater   r   r   r   r   r  r    sy    **).. *! !  #//0oqrs(()CQG- **+NPQR!!"<a@)r   r  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SSS	S
9r
\R                  " SS5      r\R                  " SS5      rSrg)=GoogleCloudPolicytroubleshooterIamV3alphaPABPolicyExplanationi  a  Details about how the relevant principal access boundary policies affect
the overall access state.

Enums:
  PrincipalAccessBoundaryAccessStateValueValuesEnum: Output only. Indicates
    whether the principal is allowed to access specified resource, based on
    evaluating all applicable principal access boundary bindings and
    policies.
  RelevanceValueValuesEnum: The relevance of the principal access boundary
    access state to the overall access state.

Fields:
  explainedBindingsAndPolicies: List of principal access boundary policies
    and bindings that are applicable to the principal's access state, with
    annotations to indicate how each binding and policy contributes to the
    overall access state.
  principalAccessBoundaryAccessState: Output only. Indicates whether the
    principal is allowed to access specified resource, based on evaluating
    all applicable principal access boundary bindings and policies.
  relevance: The relevance of the principal access boundary access state to
    the overall access state.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
oGoogleCloudPolicytroubleshooterIamV3alphaPABPolicyExplanation.PrincipalAccessBoundaryAccessStateValueValuesEnumi  aO  Output only. Indicates whether the principal is allowed to access
specified resource, based on evaluating all applicable principal access
boundary bindings and policies.

Values:
  PAB_ACCESS_STATE_UNSPECIFIED: Not specified.
  PAB_ACCESS_STATE_ALLOWED: The PAB component allows the principal's
    access to the specified resource.
  PAB_ACCESS_STATE_NOT_ALLOWED: The PAB component doesn't allow the
    principal's access to the specified resource.
  PAB_ACCESS_STATE_NOT_ENFORCED: The PAB component is not enforced on the
    principal, or the specified resource. This state refers to the
    following scenarios: - IAM doesn't enforce the specified permission at
    the PAB policy's [enforcement
    version](https://cloud.google.com/iam/help/pab/enforcement-versions),
    so the PAB policy can't block access. - The binding doesn't apply to
    the principal, so the policy is not enforced. - The PAB policy doesn't
    have any rules
  PAB_ACCESS_STATE_UNKNOWN_INFO: The sender of the request does not have
    access to the PAB component, or the relevant data to explain the PAB
    component.
r   r   r   rE   rF   r   Nr{  r   r   r   1PrincipalAccessBoundaryAccessStateValueValuesEnumr    s'    , $%  #$ $%!$%!r   r  c                   $    \ rS rSrSrSrSrSrSrg)VGoogleCloudPolicytroubleshooterIamV3alphaPABPolicyExplanation.RelevanceValueValuesEnumi  a  The relevance of the principal access boundary access state to the
overall access state.

Values:
  HEURISTIC_RELEVANCE_UNSPECIFIED: Not specified.
  HEURISTIC_RELEVANCE_NORMAL: The data point has a limited effect on the
    result. Changing the data point is unlikely to affect the overall
    determination.
  HEURISTIC_RELEVANCE_HIGH: The data point has a strong effect on the
    result. Changing the data point is likely to affect the overall
    determination.
r   r   r   r   Nr   r   r   r   r   r    r   r   r   rx  r   Tr#   r   rE   r   N)r   r   r   r   r   r   rO   r  r   r%   explainedBindingsAndPoliciesr[   "principalAccessBoundaryAccessStater   r   r   r   r   r  r    st    .&).. &:! !" "+!7!78  BC  NR  "S'0':':;npq'r$!!"<a@)r   r  c                   b    \ rS rSrSr\R                  " SS5      r\R                  " S5      r	Sr
g)EGoogleCloudPolicytroubleshooterIamV3alphaTroubleshootIamPolicyRequesti  a^  Request for TroubleshootIamPolicy.

Fields:
  accessTuple: The information to use for checking whether a principal has a
    permission for a resource.
  resolveUnknowns: Optional. When true, the troubleshooter will use
    internal-only mechanisms to resolve an 'UNKNOWN' access state to a more
    definitive 'CAN_ACCESS' or 'CANNOT_ACCESS' state.
r   r   r   r   N)r   r   r   r   r   r   r%   accessTuplerQ   resolveUnknownsr   r   r   r   r  r    s-     &&']_`a+**1-/r   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " SS5      r
\R                  " S	S
5      r\R                  " SS5      r\R                  " SS5      rSrg)FGoogleCloudPolicytroubleshooterIamV3alphaTroubleshootIamPolicyResponsei&  a  Response for TroubleshootIamPolicy.

Enums:
  OverallAccessStateValueValuesEnum: Indicates whether the principal has the
    specified permission for the specified resource, based on evaluating all
    types of the applicable IAM policies.

Fields:
  accessTuple: The access tuple from the request, including any provided
    context used to evaluate the condition.
  allowPolicyExplanation: An explanation of how the applicable IAM allow
    policies affect the final access state.
  denyPolicyExplanation: An explanation of how the applicable IAM deny
    policies affect the final access state.
  overallAccessState: Indicates whether the principal has the specified
    permission for the specified resource, based on evaluating all types of
    the applicable IAM policies.
  pabPolicyExplanation: An explanation of how the applicable principal
    access boundary policies affect the final access state.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
hGoogleCloudPolicytroubleshooterIamV3alphaTroubleshootIamPolicyResponse.OverallAccessStateValueValuesEnumi<  a  Indicates whether the principal has the specified permission for the
specified resource, based on evaluating all types of the applicable IAM
policies.

Values:
  OVERALL_ACCESS_STATE_UNSPECIFIED: Not specified.
  CAN_ACCESS: The principal has the permission.
  CANNOT_ACCESS: The principal doesn't have the permission.
  UNKNOWN_INFO: The principal might have the permission, but the sender
    can't access all of the information needed to fully evaluate the
    principal's access.
  UNKNOWN_CONDITIONAL: The principal might have the permission, but Policy
    Troubleshooter can't fully evaluate the principal's access because the
    sender didn't provide the required context to evaluate the condition.
r   r   r   rE   rF   r   N)r   r   r   r   r    OVERALL_ACCESS_STATE_UNSPECIFIED
CAN_ACCESSCANNOT_ACCESSUNKNOWN_INFOUNKNOWN_CONDITIONALr   r   r   r   !OverallAccessStateValueValuesEnumr  <  s$     ()$JMLr   r  r   r   r   r   r  rE   rF   r  rG   r   N)r   r   r   r   r   r   rO   r  r%   r  allowPolicyExplanationdenyPolicyExplanationr[   overallAccessStatepabPolicyExplanationr   r   r   r   r  r  &  s    *).. , &&']_`a+$112suvw#001qstu **+NPQR"//0oqrsr   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	\R                  " S	5      r\R                  " SS
5      r\R                  " SSSS9r\R                  " SSSS9rSrg)MGoogleCloudPolicytroubleshooterServiceperimeterV3alphaAccessPolicyExplanationiY  a  Explanation of an access policy NextTAG: 6

Enums:
  DeviceEnforcementStateValueValuesEnum: The device enforcement state of the
    access policy. It indicates whether the device is used for access level
    evaluation.

Fields:
  accessLevelDetailedExplanations: Detailed explanations of access levels
    from the Access Level Troubleshooter Frontend Service
  accessPolicy: The full resource name of an access policy Format:
    `accessPolicies/{access_policy}`
  deviceEnforcementState: The device enforcement state of the access policy.
    It indicates whether the device is used for access level evaluation.
  servicePerimeterExplanations: The explanations for the service perimeters
    in order
  servicePerimeters: The service perimeter definitions
c                   $    \ rS rSrSrSrSrSrSrg)sGoogleCloudPolicytroubleshooterServiceperimeterV3alphaAccessPolicyExplanation.DeviceEnforcementStateValueValuesEnumim  a`  The device enforcement state of the access policy. It indicates
whether the device is used for access level evaluation.

Values:
  CONTEXT_ENFORCEMENT_STATE_UNSPECIFIED: Not used
  NOT_ENFORCED: Current context is not used for access level evaluation.
  ENFORCED: Current context is used for access level evaluation. Device is
    valid and not stale.
r   r   r   r   N)	r   r   r   r   r   %CONTEXT_ENFORCEMENT_STATE_UNSPECIFIEDNOT_ENFORCEDENFORCEDr   r   r   r   %DeviceEnforcementStateValueValuesEnumr  m  s     -.)LHr   r  .IdentityCaaIntelFrontendAccessLevelExplanationr   Tr#   r   rE   QGoogleCloudPolicytroubleshooterServiceperimeterV3alphaServicePerimeterExplanationrF   4GoogleIdentityAccesscontextmanagerV1ServicePerimeterrG   r   N)r   r   r   r   r   r   rO   r  r%   accessLevelDetailedExplanationsr   accessPolicyr[   deviceEnforcementStateservicePerimeterExplanationsservicePerimetersr   r   r   r   r  r  Y  s    &inn  %.$:$:;kmny}$~!&&q),$../VXYZ!*!7!7  9L  NO  Z^  "_,,-cefquvr   r  c                   l   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " S5      r\R                  " S	5      r\R                  " S
5      r\R                  " SS5      r\R                   " S5      r\R                  " S5      rSrg)CGoogleCloudPolicytroubleshooterServiceperimeterV3alphaDeviceContexti  a  Detailed device context. NextTAG: 8

Enums:
  EncryptionStateValueValuesEnum: Output only. Status of disk encryption on
    device.
  OsTypeValueValuesEnum: The Operating System type of the device.

Fields:
  encryptionState: Output only. Status of disk encryption on device.
  isAdminApprovedDevice: Whether the device has been approved by the domain
    admin.
  isCorpOwnedDevice: Whether the device is company (corp) owned.
  isScreenlockEnabled: If the device has enabled screen lock.
  osType: The Operating System type of the device.
  osVersion: Ex: "3.0"
  verifiedChromeOs: Whether the request comes from a device with a verified
    Chrome OS.
c                   (    \ rS rSrSrSrSrSrSrSr	g)	bGoogleCloudPolicytroubleshooterServiceperimeterV3alphaDeviceContext.EncryptionStateValueValuesEnumi  aV  Output only. Status of disk encryption on device.

Values:
  DEVICE_ENCRYPTION_STATE_UNSPECIFIED: The encryption state of the device
    is not specified or not known.
  UNSUPPORTED: The device does not support encryption.
  UNENCRYPTED: The device supports encryption, but is currently
    unencrypted.
  ENCRYPTED: The device is encrypted.
r   r   r   rE   r   N)
r   r   r   r   r   #DEVICE_ENCRYPTION_STATE_UNSPECIFIEDUNSUPPORTEDUNENCRYPTED	ENCRYPTEDr   r   r   r   EncryptionStateValueValuesEnumr    s    	 +,'KKIr   r   c                   4    \ rS rSrSrSrSrSrSrSr	Sr
S	rS
rg)YGoogleCloudPolicytroubleshooterServiceperimeterV3alphaDeviceContext.OsTypeValueValuesEnumi  a  The Operating System type of the device.

Values:
  OS_TYPE_UNSPECIFIED: The operating system of the device is not specified
    or not known.
  DESKTOP_MAC: A desktop Mac operating system.
  DESKTOP_WINDOWS: A desktop Windows operating system.
  DESKTOP_LINUX: A desktop Linux operating system.
  ANDROID: An Android operating system.
  IOS: An iOS operating system.
  DESKTOP_CHROME_OS: A desktop ChromeOS operating system.
r   r   r   rE   rF   rG   rH   r   N)r   r   r   r   r   OS_TYPE_UNSPECIFIEDDESKTOP_MACDESKTOP_WINDOWSDESKTOP_LINUXANDROIDIOSDESKTOP_CHROME_OSr   r   r   r   OsTypeValueValuesEnumr    s.     KOMG
Cr   r
  r   r   rE   rF   rG   rH   rI   r   N)r   r   r   r   r   r   rO   r   r
  r[   encryptionStaterQ   isAdminApprovedDeviceisCorpOwnedDeviceisScreenlockEnabledosTyper   	osVersionverifiedChromeOsr   r   r   r   r  r    s    &y~~  inn * ''(H!L/#003,,Q/!..q16:&##A&)++A.r   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " S5      r\R                  " S5      r\R                  " SS	5      rS
rg)@GoogleCloudPolicytroubleshooterServiceperimeterV3alphaDeviceInfoi  a#  Detailed Device Information. NextTAG: 5

Enums:
  DeviceStateValueValuesEnum: The device condition.

Fields:
  deviceContext: Device details.
  deviceId: DDS Device id. It is visible publicly in MDM
  deviceLastSyncTime: The last sync time of the device
  deviceState: The device condition.
c                   0    \ rS rSrSrSrSrSrSrSr	Sr
S	rg
)[GoogleCloudPolicytroubleshooterServiceperimeterV3alphaDeviceInfo.DeviceStateValueValuesEnumi  ac  The device condition.

Values:
  DEVICE_STATE_UNSPECIFIED: Reserved
  INFO_NOT_AUTHORIZED: Client doesn't have permission to fetch device
    details
  DEVICE_NOT_FOUND: Unable to find the device.
  NORMAL: Device state is valid
  STALE: Device expires
  INTERNAL_ERROR: Internal error to be used for cases where a specific
    device state doesn't exist
r   r   r   rE   rF   rG   r   N)r   r   r   r   r   DEVICE_STATE_UNSPECIFIEDINFO_NOT_AUTHORIZEDDEVICE_NOT_FOUNDNORMALSTALEINTERNAL_ERRORr   r   r   r   DeviceStateValueValuesEnumr    s*      !FENr   r  r  r   r   rE   rF   r   N)r   r   r   r   r   r   rO   r  r%   deviceContextr   deviceIddeviceLastSyncTimer[   deviceStater   r   r   r   r  r    sa    
9>> ( (()npqr-""1%( ,,Q/##$@!D+r   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	\R                  " SS	SS9r\R                  " S
S5      r\R                  " S
S5      rSrg)OGoogleCloudPolicytroubleshooterServiceperimeterV3alphaEgressPoliciesExplanationi  a  Explanation of a pair of source and target resources evaluated against
all egress policies. NextTAG: 5

Enums:
  EgressPolicyEvalStatesValueListEntryValuesEnum:

Fields:
  egressPolicyEvalStates: Evaluation states for the pair of source and
    target resources evaluated against all the egress policies in the
    service perimeter
  egressPolicyExplanations: Explanation details about how the pair of source
    and target resources are evaluated against all the egress policies in
    the service perimeter
  sourceResource: The source resource that egress_from policies are
    evaluated against
  targetResource: The target resource that egress_to policies are evaluated
    against
c                   0    \ rS rSrSrSrSrSrSrSr	Sr
S	rg
)~GoogleCloudPolicytroubleshooterServiceperimeterV3alphaEgressPoliciesExplanation.EgressPolicyEvalStatesValueListEntryValuesEnumi  an  EgressPolicyEvalStatesValueListEntryValuesEnum enum type.

Values:
  EGRESS_POLICY_EVAL_STATE_UNSPECIFIED: Not used
  EGRESS_POLICY_EVAL_STATE_IN_SAME_SERVICE_PERIMETER: The resources are in
    the same regular service perimeter
  EGRESS_POLICY_EVAL_STATE_GRANTED_OVER_BRIDGE: The resources are in the
    same bridge service perimeter
  EGRESS_POLICY_EVAL_STATE_GRANTED_BY_POLICY: The request is granted by
    the egress policy
  EGRESS_POLICY_EVAL_STATE_DENIED_BY_POLICY: The request is denied by the
    egress policy
  EGRESS_POLICY_EVAL_STATE_NOT_APPLICABLE: The egress policy is not
    applicable for the request
r   r   r   rE   rF   rG   r   Nr   r   r   r   r   $EGRESS_POLICY_EVAL_STATE_UNSPECIFIED2EGRESS_POLICY_EVAL_STATE_IN_SAME_SERVICE_PERIMETER,EGRESS_POLICY_EVAL_STATE_GRANTED_OVER_BRIDGE*EGRESS_POLICY_EVAL_STATE_GRANTED_BY_POLICY)EGRESS_POLICY_EVAL_STATE_DENIED_BY_POLICY'EGRESS_POLICY_EVAL_STATE_NOT_APPLICABLEr   r   r   r   .EgressPolicyEvalStatesValueListEntryValuesEnumr$    -     ,-(9:634012.01-./+r   r,  r   Tr#   MGoogleCloudPolicytroubleshooterServiceperimeterV3alphaEgressPolicyExplanationr   >GoogleCloudPolicytroubleshooterServiceperimeterV3alphaResourcerE   rF   r   N)r   r   r   r   r   r   rO   r,  r[   egressPolicyEvalStatesr%   egressPolicyExplanationssourceResourcetargetResourcer   r   r   r   r"  r"    s    &0y~~ 0. %../_abmqr&33  5D  FG  RV  W))*jlmn.))*jlmn.r   r"  c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r	 " S	 S
\R                  5      r
 " S S\R                  5      r\R                  " SSSS9r\R                  " SS5      r\R                  " SSSS9r\R                   " SSSS9r\R                  " S
S5      r\R                  " SSSS9rSrg)r.  i	  aX  Explanation of an egress policy NextTAG: 8

Enums:
  ApiOperationEvalStatesValueListEntryValuesEnum:
  EgressPolicyEvalStateValueValuesEnum: The overall evaluation state of the
    egress policy
  ExternalResourceEvalStatesValueListEntryValuesEnum:
  IdentityTypeEvalStateValueValuesEnum: Details of the evaluation state of
    the identity type
  ResourceEvalStatesValueListEntryValuesEnum:

Fields:
  apiOperationEvalStates: Details of the evaluation states of api operations
  egressPolicyEvalState: The overall evaluation state of the egress policy
  externalResourceEvalStates: Details of the evaluation states of external
    resources
  identityExplanations: Detailed explanation of the identities.
  identityTypeEvalState: Details of the evaluation state of the identity
    type
  resourceEvalStates: Details of the evaluation states of resources
c                   $    \ rS rSrSrSrSrSrSrg)|GoogleCloudPolicytroubleshooterServiceperimeterV3alphaEgressPolicyExplanation.ApiOperationEvalStatesValueListEntryValuesEnumi3	    ApiOperationEvalStatesValueListEntryValuesEnum enum type.

Values:
  API_OPERATION_EVAL_STATE_UNSPECIFIED: Not used
  API_OPERATION_EVAL_STATE_MATCH: The request matches the api operation
  API_OPERATION_EVAL_STATE_NOT_MATCH: The request doesn't match the api
    operation
r   r   r   r   N	r   r   r   r   r   $API_OPERATION_EVAL_STATE_UNSPECIFIEDAPI_OPERATION_EVAL_STATE_MATCH"API_OPERATION_EVAL_STATE_NOT_MATCHr   r   r   r   .ApiOperationEvalStatesValueListEntryValuesEnumr6  3	       ,-(%&")*&r   r<  c                   0    \ rS rSrSrSrSrSrSrSr	Sr
S	rg
)rGoogleCloudPolicytroubleshooterServiceperimeterV3alphaEgressPolicyExplanation.EgressPolicyEvalStateValueValuesEnumi@	  af  The overall evaluation state of the egress policy

Values:
  EGRESS_POLICY_EVAL_STATE_UNSPECIFIED: Not used
  EGRESS_POLICY_EVAL_STATE_IN_SAME_SERVICE_PERIMETER: The resources are in
    the same regular service perimeter
  EGRESS_POLICY_EVAL_STATE_GRANTED_OVER_BRIDGE: The resources are in the
    same bridge service perimeter
  EGRESS_POLICY_EVAL_STATE_GRANTED_BY_POLICY: The request is granted by
    the egress policy
  EGRESS_POLICY_EVAL_STATE_DENIED_BY_POLICY: The request is denied by the
    egress policy
  EGRESS_POLICY_EVAL_STATE_NOT_APPLICABLE: The egress policy is not
    applicable for the request
r   r   r   rE   rF   rG   r   Nr%  r   r   r   $EgressPolicyEvalStateValueValuesEnumr?  @	  r-  r   r@  c                   $    \ rS rSrSrSrSrSrSrg)ڀGoogleCloudPolicytroubleshooterServiceperimeterV3alphaEgressPolicyExplanation.ExternalResourceEvalStatesValueListEntryValuesEnumiW	  zExternalResourceEvalStatesValueListEntryValuesEnum enum type.

Values:
  RESOURCE_EVAL_STATE_UNSPECIFIED: Not used
  RESOURCE_EVAL_STATE_MATCH: The request matches the resource
  RESOURCE_EVAL_STATE_NOT_MATCH: The request doesn't match the resource
r   r   r   r   N	r   r   r   r   r   RESOURCE_EVAL_STATE_UNSPECIFIEDRESOURCE_EVAL_STATE_MATCHRESOURCE_EVAL_STATE_NOT_MATCHr   r   r   r   2ExternalResourceEvalStatesValueListEntryValuesEnumrB  W	       '(# !$%!r   rG  c                   (    \ rS rSrSrSrSrSrSrSr	g)	rGoogleCloudPolicytroubleshooterServiceperimeterV3alphaEgressPolicyExplanation.IdentityTypeEvalStateValueValuesEnumic	  b  Details of the evaluation state of the identity type

Values:
  IDENTITY_TYPE_EVAL_STATE_UNSPECIFIED: Not used
  IDENTITY_TYPE_EVAL_STATE_GRANTED: The request type matches the identity
  IDENTITY_TYPE_EVAL_STATE_NOT_GRANTED: The request type doesn't match the
    identity
  IDENTITY_TYPE_EVAL_STATE_NOT_SUPPORTED: The identity type is not
    supported
r   r   r   rE   r   N
r   r   r   r   r   $IDENTITY_TYPE_EVAL_STATE_UNSPECIFIED IDENTITY_TYPE_EVAL_STATE_GRANTED$IDENTITY_TYPE_EVAL_STATE_NOT_GRANTED&IDENTITY_TYPE_EVAL_STATE_NOT_SUPPORTEDr   r   r   r   $IdentityTypeEvalStateValueValuesEnumrJ  c	  !    	 ,-('($+,(-.*r   rQ  c                   $    \ rS rSrSrSrSrSrSrg)xGoogleCloudPolicytroubleshooterServiceperimeterV3alphaEgressPolicyExplanation.ResourceEvalStatesValueListEntryValuesEnumis	  ResourceEvalStatesValueListEntryValuesEnum enum type.

Values:
  RESOURCE_EVAL_STATE_UNSPECIFIED: Not used
  RESOURCE_EVAL_STATE_MATCH: The request matches the resource
  RESOURCE_EVAL_STATE_NOT_MATCH: The request doesn't match the resource
r   r   r   r   NrC  r   r   r   *ResourceEvalStatesValueListEntryValuesEnumrT  s	  rH  r   rV  r   Tr#   r   rE   IGoogleCloudPolicytroubleshooterServiceperimeterV3alphaIdentityExplanationrF   rG   rH   r   N)r   r   r   r   r   r   rO   r<  r@  rG  rQ  rV  r[   apiOperationEvalStatesegressPolicyEvalStateexternalResourceEvalStatesr%   identityExplanationsidentityTypeEvalStateresourceEvalStatesr   r   r   r   r.  r.  	  s    ,+y~~ +0Y^^ 0.
&9>> 
&/Y^^ / 
&9>> 
& %../_abmqr#--.TVWX(223gijuyz"//0{}~  JN  O#--.TVWX **+WYZeijr   r.  c                   h    \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	Sr
g)rW  i	  zExplanation of an identity. NextTAG: 3

Enums:
  IdentityEvalStateValueValuesEnum: Details about the evaluation state of
    the identity set in policy.

Fields:
  identityEvalState: Details about the evaluation state of the identity set
    in policy.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
jGoogleCloudPolicytroubleshooterServiceperimeterV3alphaIdentityExplanation.IdentityEvalStateValueValuesEnumi	  aX  Details about the evaluation state of the identity set in policy.

Values:
  IDENTITY_EVAL_STATE_UNSPECIFIED: Not used
  MATCH: The request matches the identity
  NOT_MATCH: The request doesn't match the identity
  NOT_SUPPORTED: The identity is not supported
  INFO_DENIED: The sender of the request is not allowed to verify the
    identity.
r   r   r   rE   rF   r   N)r   r   r   r   r   IDENTITY_EVAL_STATE_UNSPECIFIEDMATCH	NOT_MATCHNOT_SUPPORTEDINFO_DENIEDr   r   r   r    IdentityEvalStateValueValuesEnumr`  	  s#    	 '(#EIMKr   rf  r   r   N)r   r   r   r   r   r   rO   rf  r[   identityEvalStater   r   r   r   rW  rW  	  s-    	 "  ))*LaPr   rW  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SSSS	9r
\R                  " S
SSS	9r\R                  " SS5      r\R                  " SS5      rSrg)PGoogleCloudPolicytroubleshooterServiceperimeterV3alphaIngressPoliciesExplanationi	  a
  Explanation of ingress policies NextTAG: 5

Enums:
  IngressPolicyEvalStatesValueListEntryValuesEnum:
  TopLevelAccessLevelsEvalStateValueValuesEnum: The overall evaluation state
    of the top level access levels

Fields:
  ingressPolicyEvalStates: Details about the evaluation state of the ingress
    policy
  ingressPolicyExplanations: Explanations of ingress policies
  targetResource: The target resource to ingress to
  topLevelAccessLevelsEvalState: The overall evaluation state of the top
    level access levels
c                   0    \ rS rSrSrSrSrSrSrSr	Sr
S	rg
)ڀGoogleCloudPolicytroubleshooterServiceperimeterV3alphaIngressPoliciesExplanation.IngressPolicyEvalStatesValueListEntryValuesEnumi	  ax  IngressPolicyEvalStatesValueListEntryValuesEnum enum type.

Values:
  INGRESS_POLICY_EVAL_STATE_UNSPECIFIED: Not used
  INGRESS_POLICY_EVAL_STATE_IN_SAME_SERVICE_PERIMETER: The resources are
    in the same regular service perimeter
  INGRESS_POLICY_EVAL_STATE_GRANTED_OVER_BRIDGE: The resources are in the
    same bridge service perimeter
  INGRESS_POLICY_EVAL_STATE_GRANTED_BY_POLICY: The request is granted by
    the ingress policy
  INGRESS_POLICY_EVAL_STATE_DENIED_BY_POLICY: The request is denied by the
    ingress policy
  INGRESS_POLICY_EVAL_STATE_NOT_APPLICABLE: The ingress policy is not
    applicable for the request
r   r   r   rE   rF   rG   r   Nr   r   r   r   r   %INGRESS_POLICY_EVAL_STATE_UNSPECIFIED3INGRESS_POLICY_EVAL_STATE_IN_SAME_SERVICE_PERIMETER-INGRESS_POLICY_EVAL_STATE_GRANTED_OVER_BRIDGE+INGRESS_POLICY_EVAL_STATE_GRANTED_BY_POLICY*INGRESS_POLICY_EVAL_STATE_DENIED_BY_POLICY(INGRESS_POLICY_EVAL_STATE_NOT_APPLICABLEr   r   r   r   /IngressPolicyEvalStatesValueListEntryValuesEnumrk  	  -     -.):;745123/12./0,r   rs  c                   (    \ rS rSrSrSrSrSrSrSr	g)	}GoogleCloudPolicytroubleshooterServiceperimeterV3alphaIngressPoliciesExplanation.TopLevelAccessLevelsEvalStateValueValuesEnumi	  a  The overall evaluation state of the top level access levels

Values:
  TOP_LEVEL_ACCESS_LEVELS_EVAL_STATE_UNSPECIFIED: Not used
  NOT_APPLICABLE: The overall evaluation state of the top level access
    levels is not applicable
  GRANTED: The overall evaluation state of the top level access levels is
    granted
  DENIED: The overall evaluation state of the top level access levels is
    denied
r   r   r   rE   r   N)
r   r   r   r   r   .TOP_LEVEL_ACCESS_LEVELS_EVAL_STATE_UNSPECIFIEDNOT_APPLICABLEGRANTEDDENIEDr   r   r   r   ,TopLevelAccessLevelsEvalStateValueValuesEnumrv  	  s    
 672NGFr   r{  r   Tr#   NGoogleCloudPolicytroubleshooterServiceperimeterV3alphaIngressPolicyExplanationr   r/  rE   rF   r   N)r   r   r   r   r   r   rO   rs  r{  r[   ingressPolicyEvalStatesr%   ingressPolicyExplanationsr3  topLevelAccessLevelsEvalStater   r   r   r   ri  ri  	  s     1	 1.Y^^ " &//0acdost'44  6F  HI  TX  Y))*jlmn."+"5"56dfg"hr   ri  c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r	 " S	 S
\R                  5      r
 " S S\R                  5      r\R                  " SSSS9r\R                  " SSSS9r\R                  " SS5      r\R                  " SS5      r\R                  " S
SSS9r\R                  " SSSS9rSrg)r|  i	  aT  Explanation of an ingress policy NextTAG: 8

Enums:
  ApiOperationEvalStatesValueListEntryValuesEnum:
  IdentityTypeEvalStateValueValuesEnum: Details of the evaluation state of
    the identity type
  IngressPolicyEvalStateValueValuesEnum: The overall evaluation state of the
    ingress policy
  IngressSourceEvalStatesValueListEntryValuesEnum:
  ResourceEvalStatesValueListEntryValuesEnum:

Fields:
  apiOperationEvalStates: Details of the evaluation states of api operations
  identityExplanations: Detailed explanation of the identities.
  identityTypeEvalState: Details of the evaluation state of the identity
    type
  ingressPolicyEvalState: The overall evaluation state of the ingress policy
  ingressSourceEvalStates: Details of the evaluation states of ingress
    sources
  resourceEvalStates: Details of the evaluation states of resources
c                   $    \ rS rSrSrSrSrSrSrg)}GoogleCloudPolicytroubleshooterServiceperimeterV3alphaIngressPolicyExplanation.ApiOperationEvalStatesValueListEntryValuesEnumi	  r7  r   r   r   r   Nr8  r   r   r   r<  r  	  r=  r   r<  c                   (    \ rS rSrSrSrSrSrSrSr	g)	sGoogleCloudPolicytroubleshooterServiceperimeterV3alphaIngressPolicyExplanation.IdentityTypeEvalStateValueValuesEnumi

  rK  r   r   r   rE   r   NrL  r   r   r   rQ  r  

  rR  r   rQ  c                   0    \ rS rSrSrSrSrSrSrSr	Sr
S	rg
)tGoogleCloudPolicytroubleshooterServiceperimeterV3alphaIngressPolicyExplanation.IngressPolicyEvalStateValueValuesEnumi
  ap  The overall evaluation state of the ingress policy

Values:
  INGRESS_POLICY_EVAL_STATE_UNSPECIFIED: Not used
  INGRESS_POLICY_EVAL_STATE_IN_SAME_SERVICE_PERIMETER: The resources are
    in the same regular service perimeter
  INGRESS_POLICY_EVAL_STATE_GRANTED_OVER_BRIDGE: The resources are in the
    same bridge service perimeter
  INGRESS_POLICY_EVAL_STATE_GRANTED_BY_POLICY: The request is granted by
    the ingress policy
  INGRESS_POLICY_EVAL_STATE_DENIED_BY_POLICY: The request is denied by the
    ingress policy
  INGRESS_POLICY_EVAL_STATE_NOT_APPLICABLE: The ingress policy is not
    applicable for the request
r   r   r   rE   rF   rG   r   Nrl  r   r   r   %IngressPolicyEvalStateValueValuesEnumr  
  rt  r   r  c                   $    \ rS rSrSrSrSrSrSrg)~GoogleCloudPolicytroubleshooterServiceperimeterV3alphaIngressPolicyExplanation.IngressSourceEvalStatesValueListEntryValuesEnumi1
  a  IngressSourceEvalStatesValueListEntryValuesEnum enum type.

Values:
  INGRESS_SOURCE_EVAL_STATE_UNSPECIFIED: Not used
  INGRESS_SOURCE_EVAL_STATE_MATCH: The request matches the ingress source
  INGRESS_SOURCE_EVAL_STATE_NOT_MATCH: The request doesn't match the
    ingress source
r   r   r   r   N)	r   r   r   r   r   %INGRESS_SOURCE_EVAL_STATE_UNSPECIFIEDINGRESS_SOURCE_EVAL_STATE_MATCH#INGRESS_SOURCE_EVAL_STATE_NOT_MATCHr   r   r   r   /IngressSourceEvalStatesValueListEntryValuesEnumr  1
  s     -.)&'#*+'r   r  c                   $    \ rS rSrSrSrSrSrSrg)yGoogleCloudPolicytroubleshooterServiceperimeterV3alphaIngressPolicyExplanation.ResourceEvalStatesValueListEntryValuesEnumi>
  rU  r   r   r   r   NrC  r   r   r   rV  r  >
  rH  r   rV  r   Tr#   rW  r   rE   rF   rG   rH   r   N)r   r   r   r   r   r   rO   r<  rQ  r  r  rV  r[   rX  r%   r[  r\  ingressPolicyEvalStateingressSourceEvalStatesr]  r   r   r   r   r|  r|  	  s    ,+y~~ +/Y^^ / 1inn 1.,	 ,
&9>> 
& %../_abmqr"//0{}~  JN  O#--.TVWX$../VXYZ%//0acdost **+WYZeijr   r|  c                   `    \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	Sr
g	)
AGoogleCloudPolicytroubleshooterServiceperimeterV3alphaRemediationiR
  ac  Remediation details for one service perimeter. Customers are expected to
select one [Option[google.cloud.policytroubleshooter.serviceperimeter.v3main
.Remediation.Option] and apply all of its remediations. NextTAG: 3

Fields:
  options: A list of remediation options for the service perimeter.
    Customers are expected to pick one Option and apply all of its
    remediations, including the ingress policy remediations, egress policy
    remediations, and access levels.
  servicePerimeter: The name of the service perimeter. Format:
    `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`
GGoogleCloudPolicytroubleshooterServiceperimeterV3alphaRemediationOptionr   Tr#   r   r   N)r   r   r   r   r   r   r%   optionsr   servicePerimeterr   r   r   r   r  r  R
  s1     ""#lnoz~'**1-r   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " S5      r\R                  " SS5      rS	rg
)XGoogleCloudPolicytroubleshooterServiceperimeterV3alphaRemediationEgressPolicyRemediationid
  aH  The details of a single egress policy remediation.

Enums:
  EgressPolicyRemediationTypeValueValuesEnum: The remediation type of the
    egress policy.

Fields:
  egressPolicy: The proposed egress policy. This represents a single egress
    policy.
  egressPolicyIndex: The index of the egress policy in the service perimeter
    config in the range of [0, R), where R = number of egress policies in
    the service perimeter config if the policy remediation is a modification
    and -1 if it is an addition.
  egressPolicyRemediationType: The remediation type of the egress policy.
c                        \ rS rSrSrSrSrSrg)ڃGoogleCloudPolicytroubleshooterServiceperimeterV3alphaRemediationEgressPolicyRemediation.EgressPolicyRemediationTypeValueValuesEnumiu
  zThe remediation type of the egress policy.

Values:
  POLICY_REMEDIATION_TYPE_UNSPECIFIED: Not used
  ADDITION: Add a new policy.
r   r   r   Nr   r   r   r   r   #POLICY_REMEDIATION_TYPE_UNSPECIFIEDADDITIONr   r   r   r   *EgressPolicyRemediationTypeValueValuesEnumr  u
       +,'Hr   r  FGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigEgressPolicyr   r   rE   r   N)r   r   r   r   r   r   rO   r  r%   egressPolicyr   egressPolicyIndexr[   egressPolicyRemediationTyper   r   r   r   r  r  d
  sS     9>>  ''(prst,,,Q/ ) 3 34`bc dr   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " S5      r\R                  " SS5      rS	rg
)YGoogleCloudPolicytroubleshooterServiceperimeterV3alphaRemediationIngressPolicyRemediationi
  aS  The details of a single ingress policy remediation.

Enums:
  IngressPolicyRemediationTypeValueValuesEnum: The remediation type of the
    ingress policy.

Fields:
  ingressPolicy: The proposed ingress policy. This represents a single
    ingress policy.
  ingressPolicyIndex: The index of the ingress policy in the service
    perimeter config in the range of [0, R), where R = number of ingress
    policies in the service perimeter config if the policy remediation is a
    modification and -1 if it is an addition.
  ingressPolicyRemediationType: The remediation type of the ingress policy.
c                        \ rS rSrSrSrSrSrg)څGoogleCloudPolicytroubleshooterServiceperimeterV3alphaRemediationIngressPolicyRemediation.IngressPolicyRemediationTypeValueValuesEnumi
  zThe remediation type of the ingress policy.

Values:
  POLICY_REMEDIATION_TYPE_UNSPECIFIED: Not used
  ADDITION: Add a new policy.
r   r   r   Nr  r   r   r   +IngressPolicyRemediationTypeValueValuesEnumr  
  r  r   r  GGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigIngressPolicyr   r   rE   r   N)r   r   r   r   r   r   rO   r  r%   ingressPolicyr   ingressPolicyIndexr[   ingressPolicyRemediationTyper   r   r   r   r  r  
  sS     INN  (()rtuv- --a0!*!4!45bde!fr   r  c                       \ rS rSrSr\R                  " S5      r\R                  " SSSS9r	\R                  " SS	SS9r
S
rg)r  i
  ai  Represents a single remediation option. This includes the proposed
ingress and egress policy remediations and new access levels. NextTAG: 4

Fields:
  containsRedaction: Whether the remediation option contains redaction.
  egressPolicyRemediations: The proposed egress policy remediations.
  ingressPolicyRemediations: The proposed ingress policy remediations.
r   r  r   Tr#   r  rE   r   N)r   r   r   r   r   r   rQ   containsRedactionr%   egressPolicyRemediationsingressPolicyRemediationsr   r   r   r   r  r  
  sf      ,,Q/&33  5O  QR  ]a  b'44  6Q  ST  _c  dr   r  c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SSS	9r
\R                  " S
SS	9r\R                  " SSS	9r\R                  " SSS	9r\R                  " S5      r\R                  " SS5      r\R                  " S5      r\R                  " SSS	9r\R&                  " SS5      r\R                  " SS5      r\R                  " SSS	9r\R&                  " SS5      rSrg)FGoogleCloudPolicytroubleshooterServiceperimeterV3alphaResolvedResourcei
  a  The details of a resolved resource. NextTAG: 13

Enums:
  ResolvedStateValueValuesEnum: The resolved resource's state
  ResourceTypeValueValuesEnum: The resource type of the resource.

Fields:
  bridgeServicePerimeters: Full resource names of the bridge service
    perimeters that restrict the resource Format:
    `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`
  dryrunBridgeServicePerimeters: Full resource names of the dryrun bridge
    service perimeters that restrict the resource Format:
    `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`
  dryrunRegularServicePerimeters: Full resource name of the dry run regular
    service perimeters that restricts the resource Format:
    `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`
  permissions: The iam permission names attached to this resource. This only
    applies to resources generated from resource containers.
  projectId: Project string identifier, in the format of
    "projects/{project_id}". e.g. "projects/my-project-123".
  projectInfo: Details of the project associated with this resolved
    resource.
  projectNumber: The project number of the project associated with this
    resolved resource. In the format of "projects/{project_number}".
  regularServicePerimeters: Full resource name of the regular service
    perimeters that restricts the resource Format:
    `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`
  resolvedState: The resolved resource's state
  resource: Details of the resource
  resourceNames: The resource names belonging to this resource. For network
    resource, this is its network full name or redacted name.
  resourceType: The resource type of the resource.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
cGoogleCloudPolicytroubleshooterServiceperimeterV3alphaResolvedResource.ResolvedStateValueValuesEnumi
  aO  The resolved resource's state

Values:
  RESOLVED_STATE_UNSPECIFIED: Not used
  INFO_DENIED: The caller doesn't have permission to resolve this resource
  COMPLETED: The resource has been fully resolved
  NOT_APPLICABLE: The resource cannot be restricted by service perimeters
  ERROR: The resource cannot be resolved due to an error.
r   r   r   rE   rF   r   N)r   r   r   r   r   RESOLVED_STATE_UNSPECIFIEDre  	COMPLETEDrx  ERRORr   r   r   r   ResolvedStateValueValuesEnumr  
  s#     "#KINEr   r  c                        \ rS rSrSrSrSrSrg)bGoogleCloudPolicytroubleshooterServiceperimeterV3alphaResolvedResource.ResourceTypeValueValuesEnumi
  ztThe resource type of the resource.

Values:
  RESOURCE_TYPE_UNSPECIFIED: Not used
  NETWORK: Network resource type.
r   r   r   N)r   r   r   r   r   RESOURCE_TYPE_UNSPECIFIEDNETWORKr   r   r   r   ResourceTypeValueValuesEnumr  
  s     !"Gr   r  r   Tr#   r   rE   rF   rG   QGoogleCloudPolicytroubleshooterServiceperimeterV3alphaResolvedResourceProjectInforH   rI   rJ   rK   r/  rL   rM   rN   r   N)r   r   r   r   r   r   rO   r  r  r   bridgeServicePerimetersdryrunBridgeServicePerimetersdryrunRegularServicePerimeterspermissions	projectIdr%   projectInfoprojectNumberregularServicePerimetersr[   resolvedStater   resourceNamesresourceTyper   r   r   r   r  r  
  s    DY^^  INN  &11!dC"+"7"7D"I#,#8#8T#J %%a$7+##A&)&&'z|}~+''*-&221tD%%&DaH-##$dfhi(''T:-$$%BBG,r   r  c                   <    \ rS rSrSr\R                  " S5      rSrg)r  i
  zmThe details of a project. NextTAG: 2

Fields:
  projectId: Project string identifier, e.g. "my-project-123".
r   r   N)	r   r   r   r   r   r   r   r  r   r   r   r   r  r  
  s     ##A&)r   r  c                   ^    \ rS rSrSr\R                  " S5      r\R                  " SSS9rSr	g)	r/  i  zResource checked by service perimeter check NextTAG: 3

Fields:
  name: The name of the resource
  permissions: The iam permission names
r   r   Tr#   r   N)
r   r   r   r   r   r   r   r  r  r   r   r   r   r/  r/    s+     
		q	!$%%a$7+r   r/  c                   8   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r	 " S	 S
\R                  5      r
 " S S\R                  5      r\R                  " SSSS9r\R                  " SSSS9r\R                  " SS5      r\R                  " SSSS9r\R                  " SS5      r\R                  " S
S5      r\R                  " SSSS9r\R                  " SS5      r\R                  " SS5      rSrg)WGoogleCloudPolicytroubleshooterServiceperimeterV3alphaServicePerimeterConfigExplanationi  a  Explanation of service perimeter config NextTAG: 10

Enums:
  AccessLevelsEvalStatesValueListEntryValuesEnum:
  EvalStateValueValuesEnum: Details about the evaluation state of a service
    perimeter config
  OverallEgressPoliciesEvalStateValueValuesEnum: Overall evaluation state of
    the egress policies
  OverallIngressPoliciesEvalStateValueValuesEnum: Overall evaluation state
    of the ingress policies
  RestrictedServicesEvalStateValueValuesEnum: Eval state of the restricted
    services

Fields:
  accessLevelsEvalStates: Details about the evaluation state of access
    levels
  egressPoliciesExplanations: Explanation of egress policies
  evalState: Details about the evaluation state of a service perimeter
    config
  ingressPoliciesExplanations: Explanation of ingress policies
  overallEgressPoliciesEvalState: Overall evaluation state of the egress
    policies
  overallIngressPoliciesEvalState: Overall evaluation state of the ingress
    policies
  restrictedResources: Resources that are restricted by this service
    perimeter config
  restrictedServicesEvalState: Eval state of the restricted services
  vpcAccessibleServicesExplanation: Explanation of the vpc accessible
    service policy
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
چGoogleCloudPolicytroubleshooterServiceperimeterV3alphaServicePerimeterConfigExplanation.AccessLevelsEvalStatesValueListEntryValuesEnumi4  a  AccessLevelsEvalStatesValueListEntryValuesEnum enum type.

Values:
  ACCESS_LEVEL_EVAL_STATE_UNSPECIFIED: Not used
  ACCESS_LEVEL_EVAL_STATE_SATISFIED: The access level is satisfied
  ACCESS_LEVEL_EVAL_STATE_UNSATISFIED: The access level is unsatisfied
  ACCESS_LEVEL_EVAL_STATE_ERROR: The access level is not satisfied nor
    unsatisfied
  ACCESS_LEVEL_EVAL_STATE_NOT_EXIST: The access level does not exist
r   r   r   rE   rF   r   N)r   r   r   r   r   rv   rw   rx   ry   rz   r   r   r   r   .AccessLevelsEvalStatesValueListEntryValuesEnumr  4  s'    	 +,'()%*+'$%!()%r   r  c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
pGoogleCloudPolicytroubleshooterServiceperimeterV3alphaServicePerimeterConfigExplanation.EvalStateValueValuesEnumiE  aP  Details about the evaluation state of a service perimeter config

Values:
  EVAL_STATE_UNSPECIFIED: Not used
  NOT_APPLICABLE: The evaluation state of a service perimeter config is
    not applicable
  GRANTED: The service perimeter config grants the request
  DENIED: The service perimeter config denies the request
  INHERITED_FROM_ACTIVE: The service perimeter dry run config is inherited
    from the active service perimeter. The dry run evaluation state is the
    same as the active service perimeter evaluation state. This should
    only be set for dry run service perimeter config.
r   r   r   rE   rF   r   N)r   r   r   r   r   r   rx  ry  rz  INHERITED_FROM_ACTIVEr   r   r   r   r   r  E  s$     NGFr   r   c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
څGoogleCloudPolicytroubleshooterServiceperimeterV3alphaServicePerimeterConfigExplanation.OverallEgressPoliciesEvalStateValueValuesEnumiY  a  Overall evaluation state of the egress policies

Values:
  OVERALL_EGRESS_POLICIES_EVAL_STATE_UNSPECIFIED: Not used
  OVERALL_EGRESS_POLICIES_EVAL_STATE_GRANTED: The request is granted by
    the egress policies
  OVERALL_EGRESS_POLICIES_EVAL_STATE_DENIED: The request is denied by the
    egress policies
  OVERALL_EGRESS_POLICIES_EVAL_STATE_NOT_APPLICABLE: The egress policies
    are applicable for the request
  OVERALL_EGRESS_POLICIES_EVAL_STATE_SKIPPED: The request skips the egress
    policies check
r   r   r   rE   rF   r   N)r   r   r   r   r   .OVERALL_EGRESS_POLICIES_EVAL_STATE_UNSPECIFIED*OVERALL_EGRESS_POLICIES_EVAL_STATE_GRANTED)OVERALL_EGRESS_POLICIES_EVAL_STATE_DENIED1OVERALL_EGRESS_POLICIES_EVAL_STATE_NOT_APPLICABLE*OVERALL_EGRESS_POLICIES_EVAL_STATE_SKIPPEDr   r   r   r   -OverallEgressPoliciesEvalStateValueValuesEnumr  Y  s'     67212.01-89512.r   r  c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
چGoogleCloudPolicytroubleshooterServiceperimeterV3alphaServicePerimeterConfigExplanation.OverallIngressPoliciesEvalStateValueValuesEnumim  a  Overall evaluation state of the ingress policies

Values:
  OVERALL_INGRESS_POLICIES_EVAL_STATE_UNSPECIFIED: Not used
  OVERALL_INGRESS_POLICIES_EVAL_STATE_GRANTED: The request is granted by
    the ingress policies
  OVERALL_INGRESS_POLICIES_EVAL_STATE_DENIED: The request is denied by the
    ingress policies
  OVERALL_INGRESS_POLICIES_EVAL_STATE_NOT_APPLICABLE: The ingress policies
    are applicable for the request
  OVERALL_INGRESS_POLICIES_EVAL_STATE_SKIPPED: The request skips the
    ingress policies check
r   r   r   rE   rF   r   N)r   r   r   r   r   /OVERALL_INGRESS_POLICIES_EVAL_STATE_UNSPECIFIED+OVERALL_INGRESS_POLICIES_EVAL_STATE_GRANTED*OVERALL_INGRESS_POLICIES_EVAL_STATE_DENIED2OVERALL_INGRESS_POLICIES_EVAL_STATE_NOT_APPLICABLE+OVERALL_INGRESS_POLICIES_EVAL_STATE_SKIPPEDr   r   r   r   .OverallIngressPoliciesEvalStateValueValuesEnumr  m  s'     78323/12.9:623/r   r  c                   $    \ rS rSrSrSrSrSrSrg)ڂGoogleCloudPolicytroubleshooterServiceperimeterV3alphaServicePerimeterConfigExplanation.RestrictedServicesEvalStateValueValuesEnumi  zEval state of the restricted services

Values:
  RESTRICTED_SERVICES_EVAL_STATE_UNSPECIFIED: Not used
  IS_RESTRICTED: The request service is restricted
  IS_NOT_RESTRICTED: The request service is not restricted
r   r   r   r   N)	r   r   r   r   r   *RESTRICTED_SERVICES_EVAL_STATE_UNSPECIFIEDIS_RESTRICTEDIS_NOT_RESTRICTEDr   r   r   r   *RestrictedServicesEvalStateValueValuesEnumr    s     23.Mr   r  r   Tr#   r"  r   rE   ri  rF   rG   rH   r/  rI   rJ   VGoogleCloudPolicytroubleshooterServiceperimeterV3alphaVpcAccessibleServicesExplanationrK   r   N)r   r   r   r   r   r   rO   r  r   r  r  r  r[   accessLevelsEvalStatesr%   egressPoliciesExplanationsr   ingressPoliciesExplanationsoverallEgressPoliciesEvalStateoverallIngressPoliciesEvalStaterestrictedResourcesrestrictedServicesEvalState vpcAccessibleServicesExplanationr   r   r   r   r  r    sM   >*y~~ *" (3inn 3(4y~~ 4(
9>> 
 %../_abmqr(55  7H  JK  VZ   [!!"<a@) ) 6 6  8J  LM  X\  !]#,#6#67fhi#j $-$7$78hjk$l!!../oqr  ~B  C ) 3 34`bc d%.%;%;  =U  WX  &Y"r   r  c                       \ rS rSrSr\R                  " SS5      r\R                  " S5      r	\R                  " SS5      r
Srg)	r  i  a  Explanation of a service perimeter NextTAG: 4

Fields:
  dryrunServicePerimeterConfigExplanation: Explanation of a dryrun service
    perimeter config
  name: The full name of the service perimeter
  servicePerimeterConfigExplanation: Explanation of a service perimeter
    config
r  r   r   rE   r   N)r   r   r   r   r   r   r%   'dryrunServicePerimeterConfigExplanationr   r  !servicePerimeterConfigExplanationr   r   r   r   r  r    sX     -6,B,B  D]  _`  -a)			q	!$&/&<&<  >W  YZ  '[#r   r  c                   <    \ rS rSrSr\R                  " S5      rSrg)YGoogleCloudPolicytroubleshooterServiceperimeterV3alphaTroubleshootServicePerimeterRequesti  zRequest to troubleshoot service perimeters

Fields:
  troubleshootingToken: The troubleshooting token can be generated when
    customers get access denied by the service perimeter
r   r   Nr   r   r   r   r  r    r   r   r  c                   H   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SSS	S
9r
\R                  " SS5      r\R                  " SS5      r\R                  " SS5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " SSS	S
9r\R                  " S5      r\R                  " SSS	S
9r\R                  " S5      r\R                  " SS5      rSrg)ZGoogleCloudPolicytroubleshooterServiceperimeterV3alphaTroubleshootServicePerimeterResponsei  a3  Response to troubleshoot service perimeters NextTAG: 15

Enums:
  AccessStateValueValuesEnum: The access state of the active service
    perimeters.
  DryrunAccessStateValueValuesEnum: The access state of the dry run service
    perimeters

Fields:
  accessPolicyExplanations: Explanation of access policies
  accessState: The access state of the active service perimeters.
  deviceInfo: Device information of the device from troubleshoot token.
  dryrunAccessState: The access state of the dry run service perimeters
  operation: Fully qualified name of the operation.
  principal: The principal email address of the violation principal from
    troubleshoot token.
  principalIp: The ip address of the violation principal from troubleshoot
    token.
  principalIpRegion: The region code of the principal ip address from
    troubleshoot token.
  remediation: Details about the remediations for each Service Perimeter
    involved in the violation.
  requestTime: The request_time from troubleshooting token. It captures when
    the request generating the token was made. The violation time when token
    is logged because of the VPC SC violation.
  resolvedResources: Details about the resolved resources.
  service: The service name as specified in its service configuration. For
    example, `"pubsub.googleapis.com"`. See
    [google.api.Service](https://cloud.google.com/service-
    management/reference/rpc/google.api#google.api.Service) for the
    definition of a service name.
  supportedService: Supported service that indicates the current VPC-SC
    integration status.
c                   (    \ rS rSrSrSrSrSrSrSr	g)	uGoogleCloudPolicytroubleshooterServiceperimeterV3alphaTroubleshootServicePerimeterResponse.AccessStateValueValuesEnumi  a  The access state of the active service perimeters.

Values:
  ACCESS_STATE_UNSPECIFIED: Not used
  NOT_APPLICABLE: The request is not restricted by any service perimeters
  GRANTED: The request is granted by service perimeters
  DENIED: The request is denied by service perimeters
r   r   r   rE   r   N
r   r   r   r   r   r   rx  ry  rz  r   r   r   r   r   r          !NGFr   r   c                   (    \ rS rSrSrSrSrSrSrSr	g)	{GoogleCloudPolicytroubleshooterServiceperimeterV3alphaTroubleshootServicePerimeterResponse.DryrunAccessStateValueValuesEnumi  a  The access state of the dry run service perimeters

Values:
  ACCESS_STATE_UNSPECIFIED: Not used
  NOT_APPLICABLE: The request is not restricted by any service perimeters
  GRANTED: The request is granted by service perimeters
  DENIED: The request is denied by service perimeters
r   r   r   rE   r   Nr  r   r   r    DryrunAccessStateValueValuesEnumr    r  r   r   r  r   Tr#   r   r  rE   rF   rG   rH   rI   rJ   r  rK   rL   r  rM   rN   4GoogleIdentityAccesscontextmanagerV1SupportedService   r   N)r   r   r   r   r   r   rO   r   r   r%   accessPolicyExplanationsr[   r   
deviceInfodryrunAccessStater   	operationr   principalIpprincipalIpRegionremediationrequestTimeresolvedResourcesr  supportedServicer   r   r   r   r  r    s7   !F9>>   '33  5D  FG  RV  W##$@!D+%%&hjkl*))*LaP##A&)##A&)%%a(+++A.&&'jlmx|}+%%b)+,,-uwy  EI  J!!"%'++,bdfgr   r  c                   h    \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	Sr
g)r  i  a  Explanation of the vpc accessible service policy NextTAG: 2

Enums:
  EvalStateValueValuesEnum: Details about the evaluation state of the vpc
    accessible service policy

Fields:
  evalState: Details about the evaluation state of the vpc accessible
    service policy
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
oGoogleCloudPolicytroubleshooterServiceperimeterV3alphaVpcAccessibleServicesExplanation.EvalStateValueValuesEnumi  aW  Details about the evaluation state of the vpc accessible service
policy

Values:
  EVAL_STATE_UNSPECIFIED: Not used
  NOT_APPLICABLE: Vpc accessible service evaluation is not applicable
  GRANTED: Vpc accessible service policy grants the request
  DENIED: Vpc accessible service policy denies the request
  INTERNAL: It is an internal traffic
r   r   r   rE   rF   r   N)r   r   r   r   r   r   rx  ry  rz  INTERNALr   r   r   r   r   r    s#    	 NGFHr   r   r   r   N)r   r   r   r   r   r   rO   r   r[   r   r   r   r   r   r  r    s,    	 " !!"<a@)r   r  c                   `    \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	Sr
g	)
GoogleIamV1AuditConfigi"  aw  Specifies the audit configuration for a service. The configuration
determines which permission types are logged, and what identities, if any,
are exempted from logging. An AuditConfig must have one or more
AuditLogConfigs. If there are AuditConfigs for both `allServices` and a
specific service, the union of the two AuditConfigs is used for that
service: the log_types specified in each AuditConfig are enabled, and the
exempted_members in each AuditLogConfig are exempted. Example Policy with
multiple AuditConfigs: { "audit_configs": [ { "service": "allServices",
"audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [
"user:jose@example.com" ] }, { "log_type": "DATA_WRITE" }, { "log_type":
"ADMIN_READ" } ] }, { "service": "sampleservice.googleapis.com",
"audit_log_configs": [ { "log_type": "DATA_READ" }, { "log_type":
"DATA_WRITE", "exempted_members": [ "user:aliya@example.com" ] } ] } ] } For
sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
logging. It also exempts `jose@example.com` from DATA_READ logging, and
`aliya@example.com` from DATA_WRITE logging.

Fields:
  auditLogConfigs: The configuration for logging of each type of permission.
  service: Specifies a service that will be enabled for audit logging. For
    example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
    `allServices` is a special value that covers all services.
GoogleIamV1AuditLogConfigr   Tr#   r   r   N)r   r   r   r   r   r   r%   auditLogConfigsr   r  r   r   r   r   r  r  "  s/    0 **+FTXY/!!!$'r   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " SSS9r	\R                  " S5      r\R                  " SS	5      rS
rg)r  i?  a  Provides the configuration for logging a type of permissions. Example: {
"audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [
"user:jose@example.com" ] }, { "log_type": "DATA_WRITE" } ] } This enables
'DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from
DATA_READ logging.

Enums:
  LogTypeValueValuesEnum: The log type that this config enables.

Fields:
  exemptedMembers: Specifies the identities that do not cause logging for
    this type of permission. Follows the same format of Binding.members.
  ignoreChildExemptions: A boolean attribute.
  logType: The log type that this config enables.
c                   (    \ rS rSrSrSrSrSrSrSr	g)	0GoogleIamV1AuditLogConfig.LogTypeValueValuesEnumiP  a  The log type that this config enables.

Values:
  LOG_TYPE_UNSPECIFIED: Default case. Should never be this.
  ADMIN_READ: Admin reads. Example: CloudIAM getIamPolicy
  DATA_WRITE: Data writes. Example: CloudSQL Users create
  DATA_READ: Data reads. Example: CloudSQL Users list
r   r   r   rE   r   N)
r   r   r   r   r   LOG_TYPE_UNSPECIFIEDrj   rm   rl   r   r   r   r   LogTypeValueValuesEnumr  P  s     JJIr   r  r   Tr#   r   rE   r   N)r   r   r   r   r   r   rO   r  r   exemptedMembersrQ   ignoreChildExemptionsr[   logTyper   r   r   r   r  r  ?  sO     y~~  ))!d;/#003 8!<'r   r  c                       \ rS rSrSr\R                  " S5      r\R                  " SS5      r	\R                  " SSS9r
\R                  " S	5      rS
rg)GoogleIamV1Bindingic  a  Associates `members`, or principals, with a `role`.

Fields:
  bindingId: A string attribute.
  condition: The condition that is associated with this binding. If the
    condition evaluates to `true`, then this binding applies to the current
    request. If the condition evaluates to `false`, then this binding does
    not apply to the current request. However, a different role binding
    might grant the same role to one or more of the principals in this
    binding. To learn which resources support conditions in their IAM
    policies, see the [IAM
    documentation](https://cloud.google.com/iam/help/conditions/resource-
    policies).
  members: Specifies the principals requesting access for a Google Cloud
    resource. `members` can have the following values: * `allUsers`: A
    special identifier that represents anyone who is on the internet; with
    or without a Google account. * `allAuthenticatedUsers`: A special
    identifier that represents anyone who is authenticated with a Google
    account or a service account. Does not include identities that come from
    external identity providers (IdPs) through identity federation. *
    `user:{emailid}`: An email address that represents a specific Google
    account. For example, `alice@example.com` . *
    `serviceAccount:{emailid}`: An email address that represents a Google
    service account. For example, `my-other-
    app@appspot.gserviceaccount.com`. *
    `serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]`:
    An identifier for a [Kubernetes service
    account](https://cloud.google.com/kubernetes-engine/docs/how-
    to/kubernetes-service-accounts). For example, `my-
    project.svc.id.goog[my-namespace/my-kubernetes-sa]`. *
    `group:{emailid}`: An email address that represents a Google group. For
    example, `admins@example.com`. * `domain:{domain}`: The G Suite domain
    (primary) that represents all the users of that domain. For example,
    `google.com` or `example.com`. * `principal://iam.googleapis.com/locatio
    ns/global/workforcePools/{pool_id}/subject/{subject_attribute_value}`: A
    single identity in a workforce identity pool. * `principalSet://iam.goog
    leapis.com/locations/global/workforcePools/{pool_id}/group/{group_id}`:
    All workforce identities in a group. * `principalSet://iam.googleapis.co
    m/locations/global/workforcePools/{pool_id}/attribute.{attribute_name}/{
    attribute_value}`: All workforce identities with a specific attribute
    value. * `principalSet://iam.googleapis.com/locations/global/workforcePo
    ols/{pool_id}/*`: All identities in a workforce identity pool. * `princi
    pal://iam.googleapis.com/projects/{project_number}/locations/global/work
    loadIdentityPools/{pool_id}/subject/{subject_attribute_value}`: A single
    identity in a workload identity pool. * `principalSet://iam.googleapis.c
    om/projects/{project_number}/locations/global/workloadIdentityPools/{poo
    l_id}/group/{group_id}`: A workload identity pool group. * `principalSet
    ://iam.googleapis.com/projects/{project_number}/locations/global/workloa
    dIdentityPools/{pool_id}/attribute.{attribute_name}/{attribute_value}`:
    All identities in a workload identity pool with a certain attribute. * `
    principalSet://iam.googleapis.com/projects/{project_number}/locations/gl
    obal/workloadIdentityPools/{pool_id}/*`: All identities in a workload
    identity pool. * `deleted:user:{emailid}?uid={uniqueid}`: An email
    address (plus unique identifier) representing a user that has been
    recently deleted. For example,
    `alice@example.com?uid=123456789012345678901`. If the user is recovered,
    this value reverts to `user:{emailid}` and the recovered user retains
    the role in the binding. *
    `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address
    (plus unique identifier) representing a service account that has been
    recently deleted. For example, `my-other-
    app@appspot.gserviceaccount.com?uid=123456789012345678901`. If the
    service account is undeleted, this value reverts to
    `serviceAccount:{emailid}` and the undeleted service account retains the
    role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An
    email address (plus unique identifier) representing a Google group that
    has been recently deleted. For example,
    `admins@example.com?uid=123456789012345678901`. If the group is
    recovered, this value reverts to `group:{emailid}` and the recovered
    group retains the role in the binding. * `deleted:principal://iam.google
    apis.com/locations/global/workforcePools/{pool_id}/subject/{subject_attr
    ibute_value}`: Deleted single identity in a workforce identity pool. For
    example, `deleted:principal://iam.googleapis.com/locations/global/workfo
    rcePools/my-pool-id/subject/my-subject-attribute-value`.
  role: Role that is assigned to the list of `members`, or principals. For
    example, `roles/viewer`, `roles/editor`, or `roles/owner`. For an
    overview of the IAM roles and permissions, see the [IAM
    documentation](https://cloud.google.com/iam/docs/roles-overview). For a
    list of the available pre-defined roles, see
    [here](https://cloud.google.com/iam/docs/understanding-roles).
r   r   r   rE   Tr#   rF   r   N)r   r   r   r   r   r   r   	bindingIdr%   r   membersr   r   r   r   r   r  r  c  sP    Pd ##A&)$$%5q9)!!!d3'			q	!$r   r  c                   N   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r	\R                  " SS	5      r\R                  " SS
5      r\R                  " S5      r\R                  " SS5      r\R                  " SSS9rSrg)GoogleIamV1Conditioni  ad  A condition to be met.

Enums:
  IamValueValuesEnum: Trusted attributes supplied by the IAM system.
  OpValueValuesEnum: An operator to apply the subject with.
  SysValueValuesEnum: Trusted attributes supplied by any service that owns
    resources and uses the IAM system for access control.

Fields:
  iam: Trusted attributes supplied by the IAM system.
  op: An operator to apply the subject with.
  svc: Trusted attributes discharged by the service.
  sys: Trusted attributes supplied by any service that owns resources and
    uses the IAM system for access control.
  values: The objects of the condition.
c                   8    \ rS rSrSrSrSrSrSrSr	Sr
S	rS
rSrg)'GoogleIamV1Condition.IamValueValuesEnumi  a  Trusted attributes supplied by the IAM system.

Values:
  NO_ATTR: Default non-attribute.
  AUTHORITY: Either principal or (if present) authority selector.
  ATTRIBUTION: The principal (even if an authority selector is present),
    which must only be used for attribution, not authorization.
  SECURITY_REALM: Any of the security realms in the IAMContext
    (go/security-realms). When used with IN, the condition indicates "any
    of the request's realms match one of the given values; with NOT_IN,
    "none of the realms match any of the given values". Note that a value
    can be: - 'self:campus' (i.e., clients that are in the same campus) -
    'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-
    region' (i.e., allow connections from clients that are in the same
    cloud region) - 'self:prod-region' (i.e., allow connections from
    clients that are in the same prod region) - 'guardians' (i.e., allow
    connections from its guardian realms. See go/security-realms-
    glossary#guardian for more information.) - 'cryto_core_guardians'
    (i.e., allow connections from its crypto core guardian realms. See
    go/security-realms-glossary#guardian for more information.) Crypto
    Core coverage is a super-set of Default coverage, containing
    information about coverage between higher tier data centers (e.g.,
    YAWNs). Most services should use Default coverage and only use Crypto
    Core coverage if the service is involved in greenfield turnup of new
    higher tier data centers (e.g., credential infrastructure, machine/job
    management systems, etc.). - 'self' [DEPRECATED] (i.e., allow
    connections from clients that are in the same security realm, which is
    currently but not guaranteed to be campus-sized) - a realm (e.g.,
    'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see:
    go/realm-groups) A match is determined by a realm group membership
    check performed by a RealmAclRep object (go/realm-acl-howto). It is
    not permitted to grant access based on the *absence* of a realm, so
    realm conditions can only be used in a "positive" context (e.g.,
    ALLOW/IN or DENY/NOT_IN).
  APPROVER: An approver (distinct from the requester) that has authorized
    this request. When used with IN, the condition indicates that one of
    the approvers associated with the request matches the specified
    principal, or is a member of the specified group. Approvers can only
    grant additional access, and are thus only used in a strictly positive
    context (e.g. ALLOW/IN or DENY/NOT_IN).
  JUSTIFICATION_TYPE: What types of justifications have been supplied with
    this request. String values should match enum names from
    security.credentials.JustificationType, e.g. "MANUAL_STRING". It is
    not permitted to grant access based on the *absence* of a
    justification, so justification conditions can only be used in a
    "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple
    justifications, e.g., a Buganizer ID and a manually-entered reason,
    are normal and supported.
  CREDENTIALS_TYPE: What type of credentials have been supplied with this
    request. String values should match enum names from
    security_loas_l2.CredentialsType - currently, only
    CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access
    based on the *absence* of a credentials type, so the conditions can
    only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
  CREDS_ASSERTION: Properties of the credentials supplied with this
    request. See http://go/rpcsp-credential-assertions?polyglot=rpcsp-v1-0
    The conditions can only be used in a "positive" context (e.g.,
    ALLOW/IN or DENY/NOT_IN).
r   r   r   rE   rF   rG   rH   rI   r   N)r   r   r   r   r   NO_ATTR	AUTHORITYATTRIBUTIONSECURITY_REALMAPPROVERJUSTIFICATION_TYPECREDENTIALS_TYPECREDS_ASSERTIONr   r   r   r   IamValueValuesEnumr$    s4    :v GIKNHOr   r-  c                   0    \ rS rSrSrSrSrSrSrSr	Sr
S	rg
)&GoogleIamV1Condition.OpValueValuesEnumi  a  An operator to apply the subject with.

Values:
  NO_OP: Default no-op.
  EQUALS: DEPRECATED. Use IN instead.
  NOT_EQUALS: DEPRECATED. Use NOT_IN instead.
  IN: The condition is true if the subject (or any element of it if it is
    a set) matches any of the supplied values.
  NOT_IN: The condition is true if the subject (or every element of it if
    it is a set) matches none of the supplied values.
  DISCHARGED: Subject is discharged
r   r   r   rE   rF   rG   r   N)r   r   r   r   r   NO_OPEQUALS
NOT_EQUALSINNOT_IN
DISCHARGEDr   r   r   r   OpValueValuesEnumr/    s'     EFJ	
BFJr   r6  c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
'GoogleIamV1Condition.SysValueValuesEnumi'  a  Trusted attributes supplied by any service that owns resources and
uses the IAM system for access control.

Values:
  NO_ATTR: Default non-attribute type
  REGION: Region of the resource
  SERVICE: Service name
  NAME: Resource name
  IP: IP address of the caller
r   r   r   rE   rF   r   N)r   r   r   r   r   r%  REGIONSERVICENAMEIPr   r   r   r   SysValueValuesEnumr8  '  s"    	 GFGD	
Br   r=  r   r   rE   rF   rG   Tr#   r   N)r   r   r   r   r   r   rO   r-  r6  r=  r[   iamopr   svcsysr&   r   r   r   r   r"  r"    s    "C9>> CJ).. (9>> " 	0!4#.2"a #0!4#  T2&r   r"  c                       \ rS rSrSr\R                  " SS5      r\R                  " SS5      r\R                  " SS5      r	S	r
g
)GoogleIamV1LogConfigi?  zSpecifies what kind of log the caller must write

Fields:
  cloudAudit: Cloud audit options.
  counter: Counter options.
  dataAccess: Data access options.
%GoogleIamV1LogConfigCloudAuditOptionsr   "GoogleIamV1LogConfigCounterOptionsr   %GoogleIamV1LogConfigDataAccessOptionsrE   r   N)r   r   r   r   r   r   r%   
cloudAuditcounter
dataAccessr   r   r   r   rC  rC  ?  sB     %%&MqQ*""#GK'%%&MqQ*r   rC  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS	5      r\R                  " SS
5      rSrg)rD  iM  a  Write a Cloud Audit log

Enums:
  LogNameValueValuesEnum: The log_name to populate in the Cloud Audit
    Record.
  PermissionTypeValueValuesEnum: The type associated with the permission.

Fields:
  authorizationLoggingOptions: Information used by the Cloud Audit Logging
    pipeline. Will be deprecated once the migration to PermissionType is
    complete (b/201806118).
  logName: The log_name to populate in the Cloud Audit Record.
  permissionType: The type associated with the permission.
c                   $    \ rS rSrSrSrSrSrSrg)<GoogleIamV1LogConfigCloudAuditOptions.LogNameValueValuesEnumi]  zThe log_name to populate in the Cloud Audit Record.

Values:
  UNSPECIFIED_LOG_NAME: Default. Should not be used.
  ADMIN_ACTIVITY: Corresponds to "cloudaudit.googleapis.com/activity"
  DATA_ACCESS: Corresponds to "cloudaudit.googleapis.com/data_access"
r   r   r   r   N)	r   r   r   r   r   UNSPECIFIED_LOG_NAMEADMIN_ACTIVITYDATA_ACCESSr   r   r   r   LogNameValueValuesEnumrL  ]  s     NKr   rP  c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
CGoogleIamV1LogConfigCloudAuditOptions.PermissionTypeValueValuesEnumii  a  The type associated with the permission.

Values:
  PERMISSION_TYPE_UNSPECIFIED: Default. Should not be used.
  ADMIN_READ: Permissions that gate reading resource configuration or
    metadata.
  ADMIN_WRITE: Permissions that gate modification of resource
    configuration or metadata.
  DATA_READ: Permissions that gate reading user-provided data.
  DATA_WRITE: Permissions that gate writing user-provided data.
r   r   r   rE   rF   r   Nrh   r   r   r   rn   rR  i  s#    
 #$JKIJr   rn   rc   r   r   rE   r   N)r   r   r   r   r   r   rO   rP  rn   r%   authorizationLoggingOptionsr[   logNamero   r   r   r   r   rD  rD  M  sd    
y~~ 
inn $ !* 6 67dfg h 8!<'&&'FJ.r   rD  c                       \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	\R                  " S5      r
S	rg
)rE  i  a  Increment a streamz counter with the specified metric and field names.
Metric names should start with a '/', generally be lowercase-only, and end
in "_count". Field names should not contain an initial slash. The actual
exported metric names will have "/iam/policy" prepended. Field names
correspond to IAM request parameters and field values are their respective
values. Supported field names: - "authority", which is "[token]" if
IAMContext.token is present, otherwise the value of
IAMContext.authority_selector if present, and otherwise a representation of
IAMContext.principal; or - "iam_principal", a representation of
IAMContext.principal even if a token or authority selector is present; or -
"" (empty string), resulting in a counter with no fields. Examples: counter
{ metric: "/debug_access_count" field: "iam_principal" } ==> increment
counter /iam/policy/debug_access_count {iam_principal=[value of
IAMContext.principal]}

Fields:
  customFields: Custom fields.
  field: The field value to attribute.
  metric: The metric to update.
-GoogleIamV1LogConfigCounterOptionsCustomFieldr   Tr#   r   rE   r   N)r   r   r   r   r   r   r%   customFieldsr   fieldmetricr   r   r   r   rE  rE    s@    * ''(WYZeij,



"%  #&r   rE  c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      rSr	g)rV  i  aL  Custom fields. These can be used to create a counter with arbitrary
field/value pairs. See: go/rpcsp-custom-fields.

Fields:
  name: Name is the field name.
  value: Value is the field value. It is important that in contrast to the
    CounterOptions.field, the value here is a constant that is not derived
    from the IAMContext.
r   r   r   N)
r   r   r   r   r   r   r   r  r   r   r   r   r   rV  rV    s)     
		q	!$



"%r   rV  c                       \ rS rSrSr " S S\R                  5      r\R                  " S5      r	\R                  " SS5      rSrg)	rF  i  zWrite a Data Access (Gin) log

Enums:
  LogModeValueValuesEnum:

Fields:
  isDirectAuth: Indicates that access was granted by a regular grant policy
  logMode: A LogModeValueValuesEnum attribute.
c                        \ rS rSrSrSrSrSrg)<GoogleIamV1LogConfigDataAccessOptions.LogModeValueValuesEnumi  a  LogModeValueValuesEnum enum type.

Values:
  LOG_MODE_UNSPECIFIED: Client is not required to write a partial Gin log
    immediately after the authorization check. If client chooses to write
    one and it fails, client may either fail open (allow the operation to
    continue) or fail closed (handle as a DENY outcome).
  LOG_FAIL_CLOSED: The application's operation in the context of which
    this authorization check is being made may only be performed if it is
    successfully logged to Gin. For instance, the authorization library
    may satisfy this obligation by emitting a partial log entry at
    authorization check time and only returning ALLOW to the application
    if it succeeds. If a matching Rule has this directive, but the client
    has not indicated that it will honor such requirements, then the IAM
    check will result in authorization failure by setting
    CheckPolicyResponse.success=false.
r   r   r   N)r   r   r   r   r   LOG_MODE_UNSPECIFIEDLOG_FAIL_CLOSEDr   r   r   r   LogModeValueValuesEnumr]    s    " Or   r`  r   r   r   N)r   r   r   r   r   r   rO   r`  rQ   isDirectAuthr[   logModer   r   r   r   rF  rF    s<    y~~ * ''*, 8!<'r   rF  c                       \ rS rSrSr\R                  " SSSS9r\R                  " SSSS9r\R                  " S	5      r
\R                  " S
SSS9r\R                  " S\R                  R                  S9rSrg)rf  i  ak  An Identity and Access Management (IAM) policy, which specifies access
controls for Google Cloud resources. A `Policy` is a collection of
`bindings`. A `binding` binds one or more `members`, or principals, to a
single `role`. Principals can be user accounts, service accounts, Google
groups, and domains (such as G Suite). A `role` is a named list of
permissions; each `role` can be an IAM predefined role or a user-created
custom role. For some types of Google Cloud resources, a `binding` can also
specify a `condition`, which is a logical expression that allows access to a
resource only if the expression evaluates to `true`. A condition can add
constraints based on attributes of the request, the resource, or both. To
learn which resources support conditions in their IAM policies, see the [IAM
documentation](https://cloud.google.com/iam/help/conditions/resource-
policies). **JSON example:** ``` { "bindings": [ { "role":
"roles/resourcemanager.organizationAdmin", "members": [
"user:mike@example.com", "group:admins@example.com", "domain:google.com",
"serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role":
"roles/resourcemanager.organizationViewer", "members": [
"user:eve@example.com" ], "condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020", "expression":
"request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag":
"BwWWja0YfJA=", "version": 3 } ``` **YAML example:** ``` bindings: -
members: - user:mike@example.com - group:admins@example.com -
domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
role: roles/resourcemanager.organizationAdmin - members: -
user:eve@example.com role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant access after
Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z')
etag: BwWWja0YfJA= version: 3 ``` For a description of IAM and its features,
see the [IAM documentation](https://cloud.google.com/iam/docs/).

Fields:
  auditConfigs: Specifies cloud audit logging configuration for this policy.
  bindings: Associates a list of `members`, or principals, with a `role`.
    Optionally, may specify a `condition` that determines how and when the
    `bindings` are applied. Each of the `bindings` must contain at least one
    principal. The `bindings` in a `Policy` can refer to up to 1,500
    principals; up to 250 of these principals can be Google groups. Each
    occurrence of a principal counts towards these limits. For example, if
    the `bindings` grant 50 different roles to `user:alice@example.com`, and
    not to any other principal, then you can add another 1,450 principals to
    the `bindings` in the `Policy`.
  etag: `etag` is used for optimistic concurrency control as a way to help
    prevent simultaneous updates of a policy from overwriting each other. It
    is strongly suggested that systems make use of the `etag` in the read-
    modify-write cycle to perform policy updates in order to avoid race
    conditions: An `etag` is returned in the response to `getIamPolicy`, and
    systems are expected to put that etag in the request to `setIamPolicy`
    to ensure that their change will be applied to the same version of the
    policy. **Important:** If you use IAM Conditions, you must include the
    `etag` field whenever you call `setIamPolicy`. If you omit this field,
    then IAM allows you to overwrite a version `3` policy with a version `1`
    policy, and all of the conditions in the version `3` policy are lost.
  rules: If more than one rule is specified, the rules are applied in the
    following manner: - All matching LOG rules are always applied. - If any
    DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be
    applied if one or more matching rule requires logging. - Otherwise, if
    any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging
    will be applied if one or more matching rule requires logging. -
    Otherwise, if no rule applies, permission is denied.
  version: Specifies the format of the policy. Valid values are `0`, `1`,
    and `3`. Requests that specify an invalid value are rejected. Any
    operation that affects conditional role bindings must specify version
    `3`. This requirement applies to the following operations: * Getting a
    policy that includes a conditional role binding * Adding a conditional
    role binding to a policy * Changing a conditional role binding in a
    policy * Removing any role binding, with or without a condition, from a
    policy that includes conditions **Important:** If you use IAM
    Conditions, you must include the `etag` field whenever you call
    `setIamPolicy`. If you omit this field, then IAM allows you to overwrite
    a version `3` policy with a version `1` policy, and all of the
    conditions in the version `3` policy are lost. If a policy does not
    include any conditions, operations on that policy may specify any valid
    version or leave the field unset. To learn which resources support
    conditions in their IAM policies, see the [IAM
    documentation](https://cloud.google.com/iam/help/conditions/resource-
    policies).
r  r   Tr#   r  r   rE   GoogleIamV1RulerF   rG   r   r   N)r   r   r   r   r   r   r%   auditConfigsbindingsrS   etagrulesr   r   r   r  r   r   r   r   rf  rf    sx    L\ ''(@!dS,##$8!dK(			a	 $

 
 !2A
E%""1i.?.?.E.EF'r   rf  c                   :   \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " SSSS	9r\R                  " S
5      r\R                  " SSS	9r\R                  " SSSS	9r\R                  " SSS	9r\R                  " SSS	9rSrg)rd  i$  a  A rule to be applied in a Policy.

Enums:
  ActionValueValuesEnum: Required

Fields:
  action: Required
  conditions: Additional restrictions that must be met. All conditions must
    pass for the rule to match.
  description: Human-readable description of the rule.
  in_: If one or more 'in' clauses are specified, the rule matches if the
    PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
  logConfig: The config returned to callers of CheckPolicy for any entries
    that match the LOG action.
  notIn: If one or more 'not_in' clauses are specified, the rule matches if
    the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format
    for in and not_in entries can be found at in the Local IAM documentation
    (see go/local-iam#features).
  permissions: A permission is a string of form `..` (e.g.,
    'storage.buckets.list'). A value of '*' matches all permissions, and a
    verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.
c                   0    \ rS rSrSrSrSrSrSrSr	Sr
S	rg
)%GoogleIamV1Rule.ActionValueValuesEnumi<  a  Required

Values:
  NO_ACTION: Default no action.
  ALLOW: Matching 'Entries' grant access.
  ALLOW_WITH_LOG: Matching 'Entries' grant access and the caller promises
    to log the request per the returned log_configs.
  DENY: Matching 'Entries' deny access.
  DENY_WITH_LOG: Matching 'Entries' deny access and the caller promises to
    log the request per the returned log_configs.
  LOG: Matching 'Entries' tell IAM.Check callers to generate logs.
r   r   r   rE   rF   rG   r   N)r   r   r   r   r   	NO_ACTIONr  ALLOW_WITH_LOGDENYDENY_WITH_LOGLOGr   r   r   r   ActionValueValuesEnumrk  <  s'     IENDM
Cr   rq  r   r"  r   Tr#   rE   rF   rC  rG   rH   rI   r   N)r   r   r   r   r   r   rO   rq  r[   actionr%   
conditionsr   descriptionin_	logConfignotInr  r   r   r   r   rd  rd  $  s    .inn ( 6:&%%&<a$O*%%a(+a$/#$$%;QN)


D
1%%%a$7+r   rd  c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " S5      r
S	rg
)GoogleIamV2AccessBoundaryRuleiY  aV  An IAM access boundary rule, which defines an upper bound of IAM
permissions on a single resource. All access boundary rules in an access
boundary policy are evaluated together as a union. Even if this access
boundary rule does not allow access to the resource, another access boundary
rule might allow access.

Fields:
  availabilityCondition: Optional. An availability condition that further
    constrains the access allowed by the access boundary rule. If the
    condition evaluates to `true`, then this access boundary rule will
    provide access to the specified resource, assuming the principal has the
    required permissions for the resource. If the condition does not
    evaluate to `true`, then access to the specified resource will not be
    available. The condition can only evaluate the access level for the
    request. Access levels use the format
    `accessPolicies/{policy_name}/accessLevels/{access_level_shortname}`.
  availablePermissions: Required. A list of permissions that may be allowed
    for use on the specified resource. The only supported value is `*`,
    which represents all permissions.
  availableResource: Required. The full resource name of a Google Cloud
    resource. The format is defined at
    https://cloud.google.com/apis/design/resource_names. The only supported
    value is `*`, which represents all resources.
r   r   r   Tr#   rE   r   N)r   r   r   r   r   r   r%   availabilityConditionr   availablePermissionsavailableResourcer   r   r   r   ry  ry  Y  sA    2 $001A1E"..q4@++A.r   ry  c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " SSS9r
\R                  " S	SS9r\R                  " S
SS9r\R                  " SSS9rSrg)GoogleIamV2DenyRuleix  a  A deny rule in an IAM deny policy.

Fields:
  denialCondition: The condition that determines whether this deny rule
    applies to a request. If the condition expression evaluates to `true`,
    then the deny rule is applied; otherwise, the deny rule is not applied.
    Each deny rule is evaluated independently. If this deny rule does not
    apply to a request, other deny rules might still apply. The condition
    can use CEL functions that evaluate [resource
    tags](https://cloud.google.com/iam/help/conditions/resource-tags). Other
    functions and operators are not supported.
  deniedPermissions: The permissions that are explicitly denied by this
    rule. Each permission uses the format
    `{service_fqdn}/{resource}.{verb}`, where `{service_fqdn}` is the fully
    qualified domain name for the service. For example,
    `iam.googleapis.com/roles.list`.
  deniedPrincipals:  The identities that are prevented from using one or
    more permissions on Google Cloud resources. This field can contain the
    following values: * `principal://goog/subject/{email_id}`: A specific
    Google Account. Includes Gmail, Cloud Identity, and Google Workspace
    user accounts. For example,
    `principal://goog/subject/alice@example.com`. * `principal://iam.googlea
    pis.com/projects/-/serviceAccounts/{service_account_id}`: A Google Cloud
    service account. For example,
    `principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-
    account@iam.gserviceaccount.com`. *
    `principalSet://goog/group/{group_id}`: A Google group. For example,
    `principalSet://goog/group/admins@example.com`. *
    `principalSet://goog/public:all`: A special identifier that represents
    any principal that is on the internet, even if they do not have a Google
    Account or are not logged in. *
    `principalSet://goog/cloudIdentityCustomerId/{customer_id}`: All of the
    principals associated with the specified Google Workspace or Cloud
    Identity customer ID. For example,
    `principalSet://goog/cloudIdentityCustomerId/C01Abc35`. * `principal://i
    am.googleapis.com/locations/global/workforcePools/{pool_id}/subject/{sub
    ject_attribute_value}`: A single identity in a workforce identity pool.
    * `principalSet://iam.googleapis.com/locations/global/workforcePools/{po
    ol_id}/group/{group_id}`: All workforce identities in a group. * `princi
    palSet://iam.googleapis.com/locations/global/workforcePools/{pool_id}/at
    tribute.{attribute_name}/{attribute_value}`: All workforce identities
    with a specific attribute value. * `principalSet://iam.googleapis.com/lo
    cations/global/workforcePools/{pool_id}/*`: All identities in a
    workforce identity pool. * `principal://iam.googleapis.com/projects/{pro
    ject_number}/locations/global/workloadIdentityPools/{pool_id}/subject/{s
    ubject_attribute_value}`: A single identity in a workload identity pool.
    * `principalSet://iam.googleapis.com/projects/{project_number}/locations
    /global/workloadIdentityPools/{pool_id}/group/{group_id}`: A workload
    identity pool group. * `principalSet://iam.googleapis.com/projects/{proj
    ect_number}/locations/global/workloadIdentityPools/{pool_id}/attribute.{
    attribute_name}/{attribute_value}`: All identities in a workload
    identity pool with a certain attribute. * `principalSet://iam.googleapis
    .com/projects/{project_number}/locations/global/workloadIdentityPools/{p
    ool_id}/*`: All identities in a workload identity pool. * `principalSet:
    //cloudresourcemanager.googleapis.com/[projects|folders|organizations]/{
    project_number|folder_number|org_number}/type/ServiceAccount`: All
    service accounts grouped under a resource (project, folder, or
    organization). * `principalSet://cloudresourcemanager.googleapis.com/[pr
    ojects|folders|organizations]/{project_number|folder_number|org_number}/
    type/ServiceAgent`: All service agents grouped under a resource
    (project, folder, or organization). *
    `deleted:principal://goog/subject/{email_id}?uid={uid}`: A specific
    Google Account that was deleted recently. For example,
    `deleted:principal://goog/subject/alice@example.com?uid=1234567890`. If
    the Google Account is recovered, this identifier reverts to the standard
    identifier for a Google Account. *
    `deleted:principalSet://goog/group/{group_id}?uid={uid}`: A Google group
    that was deleted recently. For example,
    `deleted:principalSet://goog/group/admins@example.com?uid=1234567890`.
    If the Google group is restored, this identifier reverts to the standard
    identifier for a Google group. * `deleted:principal://iam.googleapis.com
    /projects/-/serviceAccounts/{service_account_id}?uid={uid}`: A Google
    Cloud service account that was deleted recently. For example,
    `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/my-
    service-account@iam.gserviceaccount.com?uid=1234567890`. If the service
    account is undeleted, this identifier reverts to the standard identifier
    for a service account. * `deleted:principal://iam.googleapis.com/locatio
    ns/global/workforcePools/{pool_id}/subject/{subject_attribute_value}`:
    Deleted single identity in a workforce identity pool. For example, `dele
    ted:principal://iam.googleapis.com/locations/global/workforcePools/my-
    pool-id/subject/my-subject-attribute-value`.
  exceptionPermissions: Specifies the permissions that this rule excludes
    from the set of denied permissions given by `denied_permissions`. If a
    permission appears in `denied_permissions` _and_ in
    `exception_permissions` then it will _not_ be denied. The excluded
    permissions can be specified using the same syntax as
    `denied_permissions`.
  exceptionPrincipals: The identities that are excluded from the deny rule,
    even if they are listed in the `denied_principals`. For example, you
    could add a Google group to the `denied_principals`, then exclude
    specific users who belong to that group. This field can contain the same
    values as the `denied_principals` field, excluding
    `principalSet://goog/public:all`, which represents all users on the
    internet.
  exemptedCredentialLevels: A list of credential levels that are excluded
    from this rule. If a request contains _any_ of the
    exempted_credential_levels, it will _not_ be denied.
r   r   r   Tr#   rE   rF   rG   rH   r   N)r   r   r   r   r   r   r%   denialConditionr   rL  rM  rN  rO  exemptedCredentialLevelsr   r   r   r   r~  r~  x  s}    aF **+;Q?/++A=**1t<"..q4@!--a$?&221tDr   r~  c                      \ rS rSrSr\R                  " S5       " S S\R                  5      5       r	\R                  " SS5      r\R                  " S5      r\R                  " S5      r\R                  " S	5      r\R                  " S
5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " SSSS9r\R                  " S5      r\R                  " S5      rSrg)rp  i  a>  Data for an IAM policy.

Messages:
  AnnotationsValue: A key-value map to store arbitrary metadata for the
    `Policy`. Keys can be up to 63 characters. Values can be up to 255
    characters.

Fields:
  annotations: A key-value map to store arbitrary metadata for the `Policy`.
    Keys can be up to 63 characters. Values can be up to 255 characters.
  createTime: Output only. The time when the `Policy` was created.
  deleteTime: Output only. The time when the `Policy` was deleted. Empty if
    the policy is not deleted.
  displayName: A user-specified description of the `Policy`. This value can
    be up to 63 characters.
  etag: An opaque tag that identifies the current version of the `Policy`.
    IAM uses this value to help manage concurrent updates, so they do not
    cause one update to be overwritten by another. If this field is present
    in a CreatePolicyRequest, the value is ignored.
  kind: Output only. The kind of the `Policy`. Always contains the value
    `DenyPolicy`.
  managingAuthority: Immutable. Specifies that this policy is managed by an
    authority and can only be modified by that authority. Usage is
    restricted.
  name: Immutable. The resource name of the `Policy`, which must be unique.
    Format: `policies/{attachment_point}/denypolicies/{policy_id}` The
    attachment point is identified by its URL-encoded full resource name,
    which means that the forward-slash character, `/`, must be written as
    `%2F`. For example,
    `policies/cloudresourcemanager.googleapis.com%2Fprojects%2Fmy-
    project/denypolicies/my-deny-policy`. For organizations and folders, use
    the numeric ID in the full resource name. For projects, requests can use
    the alphanumeric or the numeric ID. Responses always contain the numeric
    ID.
  rules: A list of rules that specify the behavior of the `Policy`. All of
    the rules should be of the `kind` specified in the `Policy`.
  uid: Immutable. The globally unique ID of the `Policy`. Assigned
    automatically when the `Policy` is created.
  updateTime: Output only. The time when the `Policy` was last updated.
r6   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
"GoogleIamV2Policy.AnnotationsValuei  a.  A key-value map to store arbitrary metadata for the `Policy`. Keys can
be up to 63 characters. Values can be up to 255 characters.

Messages:
  AdditionalProperty: An additional property for a AnnotationsValue
    object.

Fields:
  additionalProperties: Additional properties of type AnnotationsValue
c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      rSr	g)5GoogleIamV2Policy.AnnotationsValue.AdditionalPropertyi  An additional property for a AnnotationsValue object.

Fields:
  key: Name of the additional property.
  value: A string attribute.
r   r   r   N
r   r   r   r   r   r   r   r.   r   r   r   r   r   r?   r    )    
 !!!$c##A&er   r?   r   Tr#   r   NrA   r   r   r   AnnotationsValuer    s2    		'Y.. 	' %112FTXYr   r  r   r   rE   rF   rG   rH   rI   rJ   GoogleIamV2PolicyRulerK   Tr#   rL   rM   r   N)r   r   r   r   r   r   rP   r   rB   r  r%   annotationsr   
createTime
deleteTimedisplayNamerg  kindmanagingAuthorityr  rh  uid
updateTimer   r   r   r   rp  rp    s    'R !!"89Z** Z :Z2 &&'91=+$$Q'*$$Q'*%%a(+			q	!$			q	!$++A.			q	!$

 
 !8!d
K%b!#$$R(*r   rp  c                       \ rS rSrSr\R                  " SS5      r\R                  " SS5      r\R                  " S5      r
Srg	)
r  i5  zA single rule in a `Policy`.

Fields:
  accessBoundaryRule: A rule for an access boundary policy.
  denyRule: A rule for a deny policy.
  description: A user-specified description of the rule. This value can be
    up to 256 characters.
ry  r   r~  r   rE   r   N)r   r   r   r   r   r   r%   accessBoundaryRuledenyRuler   rt  r   r   r   r   r  r  5  s@     !--.MqQ##$91=(%%a(+r   r  c                   N   \ rS rSrSr " S S\R                  5      r\R                  " S5       " S S\R                  5      5       r\R                  " SS5      r\R                  " S	S
5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R*                  " SS5      r\R                  " S5      r\R                  " SS5      r\R                  " S5      r\R                  " S5      rSrg)r  iD  a;  IAM policy binding resource.

Enums:
  PolicyKindValueValuesEnum: Immutable. The kind of the policy to attach in
    this binding. This field must be one of the following: - Left empty
    (will be automatically set to the policy kind) - The input policy kind

Messages:
  AnnotationsValue: Optional. User-defined annotations. See
    https://google.aip.dev/148#annotations for more details such as format
    and size limitations

Fields:
  annotations: Optional. User-defined annotations. See
    https://google.aip.dev/148#annotations for more details such as format
    and size limitations
  condition: Optional. The condition to apply to the policy binding. When
    set, the `expression` field in the `Expr` must include from 1 to 10
    subexpressions, joined by the "||"(Logical OR), "&&"(Logical AND) or
    "!"(Logical NOT) operators and cannot contain more than 250 characters.
    The condition is currently only supported when bound to policies of kind
    principal access boundary. When the bound policy is a principal access
    boundary policy, the only supported attributes in any subexpression are
    `principal.type` and `principal.subject`. An example expression is:
    "principal.type == 'iam.googleapis.com/ServiceAccount'" or
    "principal.subject == 'bob@example.com'". Allowed operations for
    `principal.subject`: - `principal.subject == ` - `principal.subject != `
    - `principal.subject in []` - `principal.subject.startsWith()` -
    `principal.subject.endsWith()` Allowed operations for `principal.type`:
    - `principal.type == ` - `principal.type != ` - `principal.type in []`
    Supported principal types are Workspace, Workforce Pool, Workload Pool
    and Service Account. Allowed string must be one of: -
    iam.googleapis.com/WorkspaceIdentity -
    iam.googleapis.com/WorkforcePoolIdentity -
    iam.googleapis.com/WorkloadPoolIdentity -
    iam.googleapis.com/ServiceAccount
  createTime: Output only. The time when the policy binding was created.
  displayName: Optional. The description of the policy binding. Must be less
    than or equal to 63 characters.
  etag: Optional. The etag for the policy binding. If this is provided on
    update, it must match the server's etag.
  name: Identifier. The name of the policy binding, in the format
    `{binding_parent/locations/{location}/policyBindings/{policy_binding_id}
    `. The binding parent is the closest Resource Manager resource (project,
    folder, or organization) to the binding target. Format: * `projects/{pro
    ject_id}/locations/{location}/policyBindings/{policy_binding_id}` * `pro
    jects/{project_number}/locations/{location}/policyBindings/{policy_bindi
    ng_id}` * `folders/{folder_id}/locations/{location}/policyBindings/{poli
    cy_binding_id}` * `organizations/{organization_id}/locations/{location}/
    policyBindings/{policy_binding_id}`
  policy: Required. Immutable. The resource name of the policy to be bound.
    The binding parent and policy must belong to the same organization.
  policyKind: Immutable. The kind of the policy to attach in this binding.
    This field must be one of the following: - Left empty (will be
    automatically set to the policy kind) - The input policy kind
  policyUid: Output only. The globally unique ID of the policy to be bound.
  target: Required. Immutable. The full resource name of the resource to
    which the policy will be bound. Immutable once set.
  uid: Output only. The globally unique ID of the policy binding. Assigned
    when the policy binding is created.
  updateTime: Output only. The time when the policy binding was most
    recently updated.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
2GoogleIamV3PolicyBinding.PolicyKindValueValuesEnumi  aT  Immutable. The kind of the policy to attach in this binding. This
field must be one of the following: - Left empty (will be automatically
set to the policy kind) - The input policy kind

Values:
  POLICY_KIND_UNSPECIFIED: Unspecified policy kind; Not a valid state
  PRINCIPAL_ACCESS_BOUNDARY: Principal access boundary policy kind
  ACCESS: Access policy kind. Keep behind visibility label until Access
    Policy launch.
  TRUST_BOUNDARY: <no description>
  REGIONAL_ACCESS_BOUNDARY: Regional access boundary policy kind. Keep
    behind visibility label until Regional Access Boundary launch.
r   r   r   rE   rF   r   N)r   r   r   r   r   POLICY_KIND_UNSPECIFIEDPRINCIPAL_ACCESS_BOUNDARYACCESSTRUST_BOUNDARYREGIONAL_ACCESS_BOUNDARYr   r   r   r   PolicyKindValueValuesEnumr    s%       !FN r   r  r6   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
)GoogleIamV3PolicyBinding.AnnotationsValuei  a/  Optional. User-defined annotations. See
https://google.aip.dev/148#annotations for more details such as format and
size limitations

Messages:
  AdditionalProperty: An additional property for a AnnotationsValue
    object.

Fields:
  additionalProperties: Additional properties of type AnnotationsValue
c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      rSr	g)<GoogleIamV3PolicyBinding.AnnotationsValue.AdditionalPropertyi  r  r   r   r   Nr  r   r   r   r?   r    r  r   r?   r   Tr#   r   NrA   r   r   r   r  r    2    
	'Y.. 	' %112FTXYr   r  r   r   r   rE   rF   rG   rH   rI   rJ   rK   GoogleIamV3PolicyBindingTargetrL   rM   rN   r   N)r   r   r   r   r   r   rO   r  r   rP   rB   r  r%   r  r   r   r  r  rg  r  rh  r[   
policyKind	policyUidtargetr  r  r   r   r   r   r  r  D  s   >@!).. !( !!"89Z** Z :Z4 &&'91=+$$%5q9)$$Q'*%%a(+			q	!$			q	!$  #&""#>B*##A&)!!"BBG&b!#$$R(*r   r  c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      rSr	g)r  i  a$  The full resource name of the resource to which the policy will be
bound. Immutable once set.

Fields:
  principalSet: Immutable. The full resource name that's used for principal
    access boundary policy bindings. The principal set must be directly
    parented by the policy binding's parent or same as the parent if the
    target is a project, folder, or organization. Examples: * For bindings
    parented by an organization: * Organization:
    `//cloudresourcemanager.googleapis.com/organizations/ORGANIZATION_ID` *
    Workforce Identity:
    `//iam.googleapis.com/locations/global/workforcePools/WORKFORCE_POOL_ID`
    * Workspace Identity:
    `//iam.googleapis.com/locations/global/workspace/WORKSPACE_ID` * For
    bindings parented by a folder: * Folder:
    `//cloudresourcemanager.googleapis.com/folders/FOLDER_ID` * For bindings
    parented by a project: * Project: *
    `//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER` *
    `//cloudresourcemanager.googleapis.com/projects/PROJECT_ID` * Workload
    Identity Pool: `//iam.googleapis.com/projects/PROJECT_NUMBER/locations/L
    OCATION/workloadIdentityPools/WORKLOAD_POOL_ID`
  resource: Immutable. The full resource name that's used for access policy
    bindings Examples: * Organization:
    `//cloudresourcemanager.googleapis.com/organizations/ORGANIZATION_ID` *
    Folder: `//cloudresourcemanager.googleapis.com/folders/FOLDER_ID` *
    Project: *
    `//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER` *
    `//cloudresourcemanager.googleapis.com/projects/PROJECT_ID`
r   r   r   N)
r   r   r   r   r   r   r   principalSetr   r   r   r   r   r  r    s)    < &&q),""1%(r   r  c                      \ rS rSrSr\R                  " S5       " S S\R                  5      5       r	\R                  " SS5      r\R                  " S5      r\R                  " SS	5      r\R                  " S
5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      rSrg)r  i  a  An IAM principal access boundary policy resource.

Messages:
  AnnotationsValue: Optional. User defined annotations. See
    https://google.aip.dev/148#annotations for more details such as format
    and size limitations

Fields:
  annotations: Optional. User defined annotations. See
    https://google.aip.dev/148#annotations for more details such as format
    and size limitations
  createTime: Output only. The time when the principal access boundary
    policy was created.
  details: Optional. The details for the principal access boundary policy.
  displayName: Optional. The description of the principal access boundary
    policy. Must be less than or equal to 63 characters.
  etag: Optional. The etag for the principal access boundary. If this is
    provided on update, it must match the server's etag.
  name: Identifier. The resource name of the principal access boundary
    policy. The following format is supported: `organizations/{organization_
    id}/locations/{location}/principalAccessBoundaryPolicies/{policy_id}`
  uid: Output only. The globally unique ID of the principal access boundary
    policy.
  updateTime: Output only. The time when the principal access boundary
    policy was most recently updated.
r6   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
9GoogleIamV3PrincipalAccessBoundaryPolicy.AnnotationsValuei  a/  Optional. User defined annotations. See
https://google.aip.dev/148#annotations for more details such as format and
size limitations

Messages:
  AdditionalProperty: An additional property for a AnnotationsValue
    object.

Fields:
  additionalProperties: Additional properties of type AnnotationsValue
c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      rSr	g)LGoogleIamV3PrincipalAccessBoundaryPolicy.AnnotationsValue.AdditionalPropertyi  r  r   r   r   Nr  r   r   r   r?   r    r  r   r?   r   Tr#   r   NrA   r   r   r   r  r    r  r   r  r   r   /GoogleIamV3PrincipalAccessBoundaryPolicyDetailsrE   rF   rG   rH   rI   rJ   r   N)r   r   r   r   r   r   rP   r   rB   r  r%   r  r   r  detailsr  rg  r  r  r  r   r   r   r   r  r    s    6 !!"89Z** Z :Z4 &&'91=+$$Q'*""#TVWX'%%a(+			q	!$			q	!$a #$$Q'*r   r  c                   `    \ rS rSrSr\R                  " S5      r\R                  " SSSS9r	Sr
g	)
r  i&  a  Principal access boundary policy details

Fields:
  enforcementVersion: Optional. The version number (for example, `1` or
    `latest`) that indicates which permissions are able to be blocked by the
    policy. If empty, the PAB policy version will be set to the most recent
    version number at the time of the policy's creation.
  rules: Required. A list of principal access boundary policy rules. The
    number of rules in a policy is limited to 500.
r   ,GoogleIamV3PrincipalAccessBoundaryPolicyRuler   Tr#   r   N)r   r   r   r   r   r   r   enforcementVersionr%   rh  r   r   r   r   r  r  &  s1    	 !,,Q/

 
 !OQR]a
b%r   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " S5      r	\R                  " SS5      r\R                  " SSS	9rS
rg)r  i6  a  Principal access boundary policy rule that defines the resource
boundary.

Enums:
  EffectValueValuesEnum: Required. The access relationship of principals to
    the resources in this rule.

Fields:
  description: Optional. The description of the principal access boundary
    policy rule. Must be less than or equal to 256 characters.
  effect: Required. The access relationship of principals to the resources
    in this rule.
  resources: Required. A list of Resource Manager resources. If a resource
    is listed in the rule, then the rule applies for that resource and its
    descendants. The number of resources in a policy is limited to 500
    across all rules in the policy. The following resource types are
    supported: * Organizations, such as
    `//cloudresourcemanager.googleapis.com/organizations/123`. * Folders,
    such as `//cloudresourcemanager.googleapis.com/folders/123`. * Projects,
    such as `//cloudresourcemanager.googleapis.com/projects/123` or
    `//cloudresourcemanager.googleapis.com/projects/my-project-id`.
c                        \ rS rSrSrSrSrSrg)BGoogleIamV3PrincipalAccessBoundaryPolicyRule.EffectValueValuesEnumiN  zRequired. The access relationship of principals to the resources in
this rule.

Values:
  EFFECT_UNSPECIFIED: Effect unspecified.
  ALLOW: Allows access to the resources in this rule.
r   r   r   Nr  r   r   r   r  r  N  r  r   r  r   r   rE   Tr#   r   N)r   r   r   r   r   r   rO   r  r   rt  r[   r  	resourcesr   r   r   r   r  r  6  sN    .	inn 	 %%a(+6:&##A5)r   r  c                      \ rS rSrSr " S S\R                  5      r\R                  " S5      r	\R                  " S5      r
\R                  " S5      r\R                  " SS5      r\R                  " S	S
5      r\R                  " S	S5      r\R                  " S5      r\R$                  " S5      r\R$                  " S5      rSrg)r  i^  aI  `ServicePerimeter` describes a set of Google Cloud resources which can
freely import and export data amongst themselves, but not export outside of
the `ServicePerimeter`. If a request with a source within this
`ServicePerimeter` has a target outside of the `ServicePerimeter`, the
request will be blocked. Otherwise the request is allowed. There are two
types of Service Perimeter - Regular and Bridge. Regular Service Perimeters
cannot overlap, a single Google Cloud project or VPC network can only belong
to a single regular Service Perimeter. Service Perimeter Bridges can contain
only Google Cloud projects as members, a single Google Cloud project may
belong to multiple Service Perimeter Bridges.

Enums:
  PerimeterTypeValueValuesEnum: Perimeter type indicator. A single project
    or VPC network is allowed to be a member of single regular perimeter,
    but multiple service perimeter bridges. A project cannot be a included
    in a perimeter bridge without being included in regular perimeter. For
    perimeter bridges, the restricted service list as well as access level
    lists must be empty.

Fields:
  description: Description of the `ServicePerimeter` and its use. Does not
    affect behavior.
  etag: Optional. An opaque identifier for the current version of the
    `ServicePerimeter`. This identifier does not follow any specific format.
    If an etag is not provided, the operation will be performed as if a
    valid etag is provided.
  name: Identifier. Resource name for the `ServicePerimeter`. Format:
    `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`.
    The `service_perimeter` component must begin with a letter, followed by
    alphanumeric characters or `_`. After you create a `ServicePerimeter`,
    you cannot change its `name`.
  perimeterType: Perimeter type indicator. A single project or VPC network
    is allowed to be a member of single regular perimeter, but multiple
    service perimeter bridges. A project cannot be a included in a perimeter
    bridge without being included in regular perimeter. For perimeter
    bridges, the restricted service list as well as access level lists must
    be empty.
  spec: Proposed (or dry run) ServicePerimeter configuration. This
    configuration allows to specify and test ServicePerimeter configuration
    without enforcing actual access restrictions. Only allowed to be set
    when the "use_explicit_dry_run_spec" flag is set.
  status: Current ServicePerimeter configuration. Specifies sets of
    resources, restricted services and access levels that determine
    perimeter content and boundaries.
  title: Human readable title. Must be unique within the Policy.
  useExplicitDryRunSpec: Use explicit dry run spec flag. Ordinarily, a dry-
    run spec implicitly exists for all Service Perimeters, and that spec is
    identical to the status for those Service Perimeters. When this flag is
    set, it inhibits the generation of the implicit spec, thereby allowing
    the user to explicitly provide a configuration ("spec") to use in a dry-
    run version of the Service Perimeter. This allows the user to test
    changes to the enforced config ("status") without actually enforcing
    them. This testing is done through analyzing the differences between
    currently enforced and suggested restrictions. use_explicit_dry_run_spec
    must bet set to True if any of the fields in the spec are set to non-
    default values.
  weakenedForTesting: Indicates this Perimeter is intentionally weakened for
    Google internal testing. This will cause the Perimeter to accept non-
    prod P4 accounts as if they were prod accounts.
c                        \ rS rSrSrSrSrSrg)QGoogleIdentityAccesscontextmanagerV1ServicePerimeter.PerimeterTypeValueValuesEnumi  a  Perimeter type indicator. A single project or VPC network is allowed
to be a member of single regular perimeter, but multiple service perimeter
bridges. A project cannot be a included in a perimeter bridge without
being included in regular perimeter. For perimeter bridges, the restricted
service list as well as access level lists must be empty.

Values:
  PERIMETER_TYPE_REGULAR: Regular Perimeter. When no value is specified,
    the perimeter uses this type.
  PERIMETER_TYPE_BRIDGE: Perimeter Bridge.
r   r   r   N)r   r   r   r   r   PERIMETER_TYPE_REGULARPERIMETER_TYPE_BRIDGEr   r   r   r   PerimeterTypeValueValuesEnumr    s    
 r   r  r   r   rE   rF   :GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigrG   rH   rI   rJ   rK   r   N)r   r   r   r   r   r   rO   r  r   rt  rg  r  r[   perimeterTyper%   specstatustitlerQ   useExplicitDryRunSpecweakenedForTestingr   r   r   r   r  r  ^  s    ;zY^^  %%a(+			q	!$			q	!$%%&DaH-			 \^_	`$!!"^`ab&



"%#003 --a0r   r  c                       \ rS rSrSr\R                  " SSS9r\R                  " SSSS9r	\R                  " SS	SS9r
\R                  " S
SS9r\R                  " SSS9r\R                  " SS5      rSrg)r  i  a)  `ServicePerimeterConfig` specifies a set of Google Cloud resources that
describe specific Service Perimeter configuration.

Fields:
  accessLevels: A list of `AccessLevel` resource names that allow resources
    within the `ServicePerimeter` to be accessed from the internet.
    `AccessLevels` listed must be in the same policy as this
    `ServicePerimeter`. Referencing a nonexistent `AccessLevel` is a syntax
    error. If no `AccessLevel` names are listed, resources within the
    perimeter can only be accessed via Google Cloud calls with request
    origins within the perimeter. Example:
    `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. For Service
    Perimeter Bridge, must be empty.
  egressPolicies: List of EgressPolicies to apply to the perimeter. A
    perimeter may have multiple EgressPolicies, each of which is evaluated
    separately. Access is granted if any EgressPolicy grants it. Must be
    empty for a perimeter bridge.
  ingressPolicies: List of IngressPolicies to apply to the perimeter. A
    perimeter may have multiple IngressPolicies, each of which is evaluated
    separately. Access is granted if any Ingress Policy grants it. Must be
    empty for a perimeter bridge.
  resources: A list of Google Cloud resources that are inside of the service
    perimeter. Currently only projects and VPCs are allowed. Project format:
    `projects/{project_number}` VPC network format:
    `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
  restrictedServices: Google Cloud services that are subject to the Service
    Perimeter restrictions. For example, if `storage.googleapis.com` is
    specified, access to the storage buckets inside the perimeter must meet
    the perimeter's access restrictions.
  vpcAccessibleServices: Configuration for APIs allowed within Perimeter.
r   Tr#   r  r   r  rE   rF   rG   OGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigVpcAccessibleServicesrH   r   N)r   r   r   r   r   r   r   accessLevelsr%   egressPoliciesingressPoliciesr  restrictedServicesvpcAccessibleServicesr   r   r   r   r  r    s    @ &&q48,))*rtu  AE  F.**+tvw  CG  H/##A5) ,,Q>#00  2C  EF  Gr   r  c                   `    \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	Sr
g	)
FGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigApiOperationi  aV  Identification for an API Operation.

Fields:
  methodSelectors: API methods or permissions to allow. Method or permission
    must belong to the service specified by `service_name` field. A single
    MethodSelector entry with `*` specified for the `method` field will
    allow all methods AND permissions for the service specified in
    `service_name`.
  serviceName: The name of the API whose methods or permissions the
    IngressPolicy or EgressPolicy want to allow. A single ApiOperation with
    `service_name` field set to `*` will allow all methods AND permissions
    for all services.
HGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigMethodSelectorr   Tr#   r   r   N)r   r   r   r   r   r   r%   methodSelectorsr   serviceNamer   r   r   r   r  r    s7     **+uwx  DH  I/%%a(+r   r  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SSS	9r
\R                  " SS
5      r\R                  " SS5      r\R                  " SSSS	9rSrg)DGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigEgressFromi  a  Defines the conditions under which an EgressPolicy matches a request.
Conditions based on information about the source of the request. Note that
if the destination of the request is also protected by a ServicePerimeter,
then that ServicePerimeter must have an IngressPolicy which allows access in
order for this request to succeed.

Enums:
  IdentityTypeValueValuesEnum: Specifies the type of identities that are
    allowed access to outside the perimeter. If left unspecified, then
    members of `identities` field will be allowed access.
  SourceRestrictionValueValuesEnum: Whether to enforce traffic restrictions
    based on `sources` field. If the `sources` fields is non-empty, then
    this field must be set to `SOURCE_RESTRICTION_ENABLED`.

Fields:
  identities: A list of identities that are allowed access through
    [EgressPolicy]. Identities can be an individual user, service account,
    Google group, or third-party identity. For third-party identity, only
    single identities are supported and other identity types are not
    supported. The `v1` identities that have the prefix `user`, `group`,
    `serviceAccount`, and `principal` in
    https://cloud.google.com/iam/docs/principal-identifiers#v1 are
    supported.
  identityType: Specifies the type of identities that are allowed access to
    outside the perimeter. If left unspecified, then members of `identities`
    field will be allowed access.
  sourceRestriction: Whether to enforce traffic restrictions based on
    `sources` field. If the `sources` fields is non-empty, then this field
    must be set to `SOURCE_RESTRICTION_ENABLED`.
  sources: Sources that this EgressPolicy authorizes access from. If this
    field is not empty, then `source_restriction` must be set to
    `SOURCE_RESTRICTION_ENABLED`.
c                   (    \ rS rSrSrSrSrSrSrSr	g)	`GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigEgressFrom.IdentityTypeValueValuesEnumi  a  Specifies the type of identities that are allowed access to outside
the perimeter. If left unspecified, then members of `identities` field
will be allowed access.

Values:
  IDENTITY_TYPE_UNSPECIFIED: No blanket identity group specified.
  ANY_IDENTITY: Authorize access from all identities outside the
    perimeter.
  ANY_USER_ACCOUNT: Authorize access from all human users outside the
    perimeter.
  ANY_SERVICE_ACCOUNT: Authorize access from all service accounts outside
    the perimeter.
r   r   r   rE   r   N
r   r   r   r   r   IDENTITY_TYPE_UNSPECIFIEDANY_IDENTITYANY_USER_ACCOUNTANY_SERVICE_ACCOUNTr   r   r   r   IdentityTypeValueValuesEnumr          !"Lr   r  c                   $    \ rS rSrSrSrSrSrSrg)eGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigEgressFrom.SourceRestrictionValueValuesEnumi(  aV  Whether to enforce traffic restrictions based on `sources` field. If
the `sources` fields is non-empty, then this field must be set to
`SOURCE_RESTRICTION_ENABLED`.

Values:
  SOURCE_RESTRICTION_UNSPECIFIED: Enforcement preference unspecified, will
    not enforce traffic restrictions based on `sources` in EgressFrom.
  SOURCE_RESTRICTION_ENABLED: Enforcement preference enabled, traffic
    restrictions will be enforced based on `sources` in EgressFrom.
  SOURCE_RESTRICTION_DISABLED: Enforcement preference disabled, will not
    enforce traffic restrictions based on `sources` in EgressFrom.
r   r   r   r   N)	r   r   r   r   r   SOURCE_RESTRICTION_UNSPECIFIEDSOURCE_RESTRICTION_ENABLEDSOURCE_RESTRICTION_DISABLEDr   r   r   r    SourceRestrictionValueValuesEnumr  (  s     &'"!""#r   r  r   Tr#   r   rE   FGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigEgressSourcerF   r   N)r   r   r   r   r   r   rO   r  r  r   
identitiesr[   identityTypesourceRestrictionr%   sourcesr   r   r   r   r  r    sz     DINN &$ $" $$Q6*$$%BAF,))*LaP""#kmny}~'r   r  c                       \ rS rSrSr\R                  " SS5      r\R                  " SS5      r\R                  " S5      r
Srg	)
r  i?  a9  Policy for egress from perimeter. EgressPolicies match requests based on
`egress_from` and `egress_to` stanzas. For an EgressPolicy to match, both
`egress_from` and `egress_to` stanzas must be matched. If an EgressPolicy
matches a request, the request is allowed to span the ServicePerimeter
boundary. For example, an EgressPolicy can be used to allow VMs on networks
within the ServicePerimeter to access a defined set of projects outside the
perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
or query against a BigQuery dataset). EgressPolicies are concerned with the
*resources* that a request relates as well as the API services and API
actions being used. They do not related to the direction of data movement.
More detailed documentation for this concept can be found in the
descriptions of EgressFrom and EgressTo.

Fields:
  egressFrom: Defines conditions on the source of a request causing this
    EgressPolicy to apply.
  egressTo: Defines the conditions on the ApiOperation and destination
    resources that cause this EgressPolicy to apply.
  title: Optional. Human-readable title for the egress rule. The title must
    be unique within the perimeter and can not exceed 100 characters. Within
    the access policy, the combined length of all rule titles must not
    exceed 240,000 characters.
r  r   BGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigEgressTor   rE   r   N)r   r   r   r   r   r   r%   
egressFromegressTor   r  r   r   r   r   r  r  ?  sA    0 %%&lnop*##$hjkl(



"%r   r  c                       \ rS rSrSr\R                  " S5      r\R                  " SS5      r	\R                  " S5      r
Srg)	r  i]  a  The source that EgressPolicy authorizes access from inside the
ServicePerimeter to somewhere outside the ServicePerimeter boundaries.

Fields:
  accessLevel: An AccessLevel resource name that allows protected resources
    inside the ServicePerimeters to access outside the ServicePerimeter
    boundaries. AccessLevels listed must be in the same policy as this
    ServicePerimeter. Referencing a nonexistent AccessLevel will cause an
    error. If an AccessLevel name is not specified, only resources within
    the perimeter can be accessed through Google Cloud calls with request
    origins within the perimeter. Example:
    `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is
    specified for `access_level`, then all EgressSources will be allowed.
  pscEndpoint: Requests from this PSC will be allowed from access perimeter
    data.
  resource: A Google Cloud resource from the service perimeter that you want
    to allow to access data outside the perimeter. This field supports only
    projects. The project format is `projects/{project_number}`. You can't
    use `*` in this field to allow all Google Cloud resources.
r   WGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigPrivateServiceConnectEndpointr   rE   r   Nr   r   r   r   r   r   r   accessLevelr%   pscEndpointr   r   r   r   r   r  r  ]  sG    * %%a(+&&  (A  CD  E+""1%(r   r  c                       \ rS rSrSr\R                  " SSS9r\R                  " SSSS9r	\R                  " SSS9r
\R                  " S	SS9rS
rg)r  ix  a  Defines the conditions under which an EgressPolicy matches a request.
Conditions are based on information about the ApiOperation intended to be
performed on the `resources` specified. Note that if the destination of the
request is also protected by a ServicePerimeter, then that ServicePerimeter
must have an IngressPolicy which allows access in order for this request to
succeed. The request must match `operations` AND `resources` fields in order
to be allowed egress out of the perimeter.

Fields:
  externalResources: A list of external resources that are allowed to be
    accessed. Only AWS and Azure resources are supported. For Amazon S3, the
    supported formats are s3://BUCKET_NAME, s3a://BUCKET_NAME, and
    s3n://BUCKET_NAME. For Azure Storage, the supported format is
    azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request
    matches if it contains an external resource in this list (Example:
    s3://bucket/path). Currently '*' is not allowed.
  operations: A list of ApiOperations allowed to be performed by the sources
    specified in the corresponding EgressFrom. A request matches if it uses
    an operation/service in this list.
  resources: A list of resources, currently only projects in the form
    `projects/`, that are allowed to be accessed by sources defined in the
    corresponding EgressFrom. A request matches if it contains a resource in
    this list. If `*` is specified for `resources`, then this EgressTo rule
    will authorize access to all resources outside the perimeter.
  roles: IAM roles that represent the set of operations that the sources
    specified in the corresponding EgressFrom. are allowed to perform in
    this ServicePerimeter.
r   Tr#   r  r   rE   rF   r   N)r   r   r   r   r   r   r   externalResourcesr%   
operationsr  rolesr   r   r   r   r  r  x  s^    :  ++A=%%&npq  }A  B*##A5)


D
1%r   r  c                       \ rS rSrSr " S S\R                  5      r\R                  " SSS9r	\R                  " SS5      r\R                  " S	S
SS9rSrg)EGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigIngressFromi  a  Defines the conditions under which an IngressPolicy matches a request.
Conditions are based on information about the source of the request. The
request must satisfy what is defined in `sources` AND identity related
fields in order to match.

Enums:
  IdentityTypeValueValuesEnum: Specifies the type of identities that are
    allowed access from outside the perimeter. If left unspecified, then
    members of `identities` field will be allowed access.

Fields:
  identities: A list of identities that are allowed access through
    [IngressPolicy]. Identities can be an individual user, service account,
    Google group, or third-party identity. For third-party identity, only
    single identities are supported and other identity types are not
    supported. The `v1` identities that have the prefix `user`, `group`,
    `serviceAccount`, and `principal` in
    https://cloud.google.com/iam/docs/principal-identifiers#v1 are
    supported.
  identityType: Specifies the type of identities that are allowed access
    from outside the perimeter. If left unspecified, then members of
    `identities` field will be allowed access.
  sources: Sources that this IngressPolicy authorizes access from.
c                   (    \ rS rSrSrSrSrSrSrSr	g)	aGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigIngressFrom.IdentityTypeValueValuesEnumi  a  Specifies the type of identities that are allowed access from outside
the perimeter. If left unspecified, then members of `identities` field
will be allowed access.

Values:
  IDENTITY_TYPE_UNSPECIFIED: No blanket identity group specified.
  ANY_IDENTITY: Authorize access from all identities outside the
    perimeter.
  ANY_USER_ACCOUNT: Authorize access from all human users outside the
    perimeter.
  ANY_SERVICE_ACCOUNT: Authorize access from all service accounts outside
    the perimeter.
r   r   r   rE   r   Nr  r   r   r   r  r    r  r   r  r   Tr#   r   GGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigIngressSourcerE   r   N)r   r   r   r   r   r   rO   r  r   r  r[   r  r%   r  r   r   r   r   r  r    sU    2INN & $$Q6*$$%BAF,""#lnoz~'r   r  c                       \ rS rSrSr\R                  " SS5      r\R                  " SS5      r\R                  " S5      r
Srg	)
r  i  a  Policy for ingress into ServicePerimeter. IngressPolicies match requests
based on `ingress_from` and `ingress_to` stanzas. For an ingress policy to
match, both the `ingress_from` and `ingress_to` stanzas must be matched. If
an IngressPolicy matches a request, the request is allowed through the
perimeter boundary from outside the perimeter. For example, access from the
internet can be allowed either based on an AccessLevel or, for traffic
hosted on Google Cloud, the project of the source network. For access from
private networks, using the project of the hosting network is required.
Individual ingress policies can be limited by restricting which services
and/or actions they match using the `ingress_to` field.

Fields:
  ingressFrom: Defines the conditions on the source of a request causing
    this IngressPolicy to apply.
  ingressTo: Defines the conditions on the ApiOperation and request
    destination that cause this IngressPolicy to apply.
  title: Optional. Human-readable title for the ingress rule. The title must
    be unique within the perimeter and can not exceed 100 characters. Within
    the access policy, the combined length of all rule titles must not
    exceed 240,000 characters.
r  r   CGoogleIdentityAccesscontextmanagerV1ServicePerimeterConfigIngressTor   rE   r   N)r   r   r   r   r   r   r%   ingressFrom	ingressTor   r  r   r   r   r   r  r    sA    , &&'npqr+$$%jlmn)



"%r   r  c                       \ rS rSrSr\R                  " S5      r\R                  " SS5      r	\R                  " S5      r
Srg)	r  i  a  The source that IngressPolicy authorizes access from.

Fields:
  accessLevel: An AccessLevel resource name that allow resources within the
    ServicePerimeters to be accessed from the internet. AccessLevels listed
    must be in the same policy as this ServicePerimeter. Referencing a
    nonexistent AccessLevel will cause an error. If no AccessLevel names are
    listed, resources within the perimeter can only be accessed via Google
    Cloud calls with request origins within the perimeter. Example:
    `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is
    specified for `access_level`, then all IngressSources will be allowed.
  pscEndpoint: Requests from this PSC will be allowed to access perimeter
    data.
  resource: A Google Cloud resource that is allowed to ingress the
    perimeter. Requests from these resources will be allowed to access
    perimeter data. Currently only projects and VPCs are allowed. Project
    format: `projects/{project_number}` VPC network format:
    `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
    The project may be in any Google Cloud organization, not just the
    organization that the perimeter is defined in. `*` is not allowed, the
    case of allowing all Google Cloud resources only is not supported.
r   r  r   rE   r   Nr  r   r   r   r  r    sG    . %%a(+&&  (A  CD  E+""1%(r   r  c                       \ rS rSrSr\R                  " SSSS9r\R                  " SSS9r	\R                  " SSS9r
S	rg
)r  i  a  Defines the conditions under which an IngressPolicy matches a request.
Conditions are based on information about the ApiOperation intended to be
performed on the target resource of the request. The request must satisfy
what is defined in `operations` AND `resources` in order to match.

Fields:
  operations: A list of ApiOperations allowed to be performed by the sources
    specified in corresponding IngressFrom in this ServicePerimeter.
  resources: A list of resources, currently only projects in the form
    `projects/`, protected by this ServicePerimeter that are allowed to be
    accessed by sources defined in the corresponding IngressFrom. If a
    single `*` is specified, then access to all resources inside the
    perimeter are allowed.
  roles: IAM roles that represent the set of operations that the sources
    specified in the corresponding IngressFrom are allowed to perform in
    this ServicePerimeter.
r  r   Tr#   r   rE   r   N)r   r   r   r   r   r   r%   r  r   r  r  r   r   r   r   r  r    sK    $ %%&npq  }A  B*##A5)


D
1%r   r  c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      rSr	g)r  i  an  An allowed method or permission of a service specified in ApiOperation.

Fields:
  method: A valid method name for the corresponding `service_name` in
    ApiOperation. If `*` is used as the value for the `method`, then ALL
    methods and permissions are allowed.
  permission: A valid Cloud IAM permission for the corresponding
    `service_name` in ApiOperation.
r   r   r   N)
r   r   r   r   r   r   r   methodr   r   r   r   r   r  r    s)       #&$$Q'*r   r  c                   <    \ rS rSrSr\R                  " S5      rSrg)r  i.  zSpecifies the PSC an API call refers to.

Fields:
  forwardingRule: The global forwarding rule identifier. Forwarding rule
    format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/forwardin
    gRules/{FORWARDING_RULE_ID}`.
r   r   N)	r   r   r   r   r   r   r   forwardingRuler   r   r   r   r  r  .  s     ((+.r   r  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	r  i:  a  Specifies how APIs are allowed to communicate within the Service
Perimeter.

Fields:
  allowedServices: The list of APIs usable within the Service Perimeter.
    Must be empty unless 'enable_restriction' is True. You can specify a
    list of individual services, as well as include the 'RESTRICTED-
    SERVICES' value, which automatically includes all of the services
    protected by the perimeter.
  enableRestriction: Whether to restrict API calls within the Service
    Perimeter to the list of APIs specified in 'allowed_services'.
r   Tr#   r   r   N)r   r   r   r   r   r   r   allowedServicesrQ   enableRestrictionr   r   r   r   r  r  :  s,     ))!d;/,,Q/r   r  c                   l   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " S5      r
\R                  " S5      r\R                  " S	5      r\R                  " SS
5      r\R                  " SS5      r\R"                  " SSSS9r\R                  " S5      rSrg)r  iL  a/  `SupportedService` specifies the VPC Service Controls and its
properties.

Enums:
  ServiceSupportStageValueValuesEnum: The support stage of the service.
  SupportStageValueValuesEnum: The support stage of the service.

Fields:
  availableOnRestrictedVip: True if the service is available on the
    restricted VIP. Services on the restricted VIP typically either support
    VPC Service Controls or are core infrastructure services required for
    the functioning of Google Cloud.
  knownLimitations: True if the service is supported with some limitations.
    Check [documentation](https://cloud.google.com/vpc-service-
    controls/docs/supported-products) for details.
  name: The service name or address of the supported service, such as
    `service.googleapis.com`.
  serviceSupportStage: The support stage of the service.
  supportStage: The support stage of the service.
  supportedMethods: The list of the supported methods. This field exists
    only in response to GetSupportedService
  title: The name of the supported product, such as 'Cloud Product API'.
c                   (    \ rS rSrSrSrSrSrSrSr	g)	WGoogleIdentityAccesscontextmanagerV1SupportedService.ServiceSupportStageValueValuesEnumie  a  The support stage of the service.

Values:
  SERVICE_SUPPORT_STAGE_UNSPECIFIED: Do not use this default value.
  GA: GA features are open to all developers and are considered stable and
    fully qualified for production use.
  PREVIEW: PREVIEW indicates a pre-release stage where the product is
    functionally complete but undergoing real-world testing.
  DEPRECATED: Deprecated features are scheduled to be shut down and
    removed.
r   r   r   rE   r   N)
r   r   r   r   r   !SERVICE_SUPPORT_STAGE_UNSPECIFIEDGAPREVIEW
DEPRECATEDr   r   r   r   "ServiceSupportStageValueValuesEnumr  e  s    
 )*%	
BGJr   r  c                   8    \ rS rSrSrSrSrSrSrSr	Sr
S	rS
rSrg)PGoogleIdentityAccesscontextmanagerV1SupportedService.SupportStageValueValuesEnumiv  a  The support stage of the service.

Values:
  LAUNCH_STAGE_UNSPECIFIED: Do not use this default value.
  UNIMPLEMENTED: The feature is not yet implemented. Users can not use it.
  PRELAUNCH: Prelaunch features are hidden from users and are only visible
    internally.
  EARLY_ACCESS: Early Access features are limited to a closed group of
    testers. To use these features, you must sign up in advance and sign a
    Trusted Tester agreement (which includes confidentiality provisions).
    These features may be unstable, changed in backward-incompatible ways,
    and are not guaranteed to be released.
  ALPHA: Alpha is a limited availability test for releases before they are
    cleared for widespread use. By Alpha, all significant design issues
    are resolved and we are in the process of verifying functionality.
    Alpha customers need to apply for access, agree to applicable terms,
    and have their projects allowlisted. Alpha releases don't have to be
    feature complete, no SLAs are provided, and there are no technical
    support obligations, but they will be far enough along that customers
    can actually use them in test environments or for limited-use tests --
    just like they would in normal production cases.
  BETA: Beta is the point at which we are ready to open a release for any
    customer to use. There are no SLA or technical support obligations in
    a Beta release. Products will be complete from a feature perspective,
    but may have some open outstanding issues. Beta releases are suitable
    for limited production use cases.
  GA: GA features are open to all developers and are considered stable and
    fully qualified for production use.
  DEPRECATED: Deprecated features are scheduled to be shut down and
    removed. For more information, see the "Deprecation Policy" section of
    our [Terms of Service](https://cloud.google.com/terms/) and the
    [Google Cloud Platform Subject to the Deprecation
    Policy](https://cloud.google.com/terms/deprecation) documentation.
r   r   r   rE   rF   rG   rH   rI   r   N)r   r   r   r   r   LAUNCH_STAGE_UNSPECIFIEDUNIMPLEMENTED	PRELAUNCHEARLY_ACCESSALPHABETAr
  r  r   r   r   r   SupportStageValueValuesEnumr  v  s3    !D  !MILED	
BJr   r  r   r   rE   rF   rG   r  rH   Tr#   rI   r   N)r   r   r   r   r   r   rO   r  r  rQ   availableOnRestrictedVipknownLimitationsr   r  r[   serviceSupportStagesupportStager%   supportedMethodsr  r   r   r   r   r  r  L  s    09>> "*INN *X '33A6++A.			q	!$!++,PRST$$%BAF,++,vxy  EI  J



"%r   r  c                       \ rS rSrSr\R                  " S5       " S S\R                  5      5       r	\R                  " S\R                  R                  S9r\R                  " SSS	S
9r\R                   " S5      rSrg)r  i  a  The `Status` type defines a logical error model that is suitable for
different programming environments, including REST APIs and RPC APIs. It is
used by [gRPC](https://github.com/grpc). Each `Status` message contains
three pieces of data: error code, error message, and error details. You can
find out more about this error model and how to work with it in the [API
Design Guide](https://cloud.google.com/apis/design/errors).

Messages:
  DetailsValueListEntry: A DetailsValueListEntry object.

Fields:
  code: The status code, which should be an enum value of google.rpc.Code.
  details: A list of messages that carry the error details. There is a
    common set of message types for APIs to use.
  message: A developer-facing error message, which should be in English. Any
    user-facing error message should be localized and sent in the
    google.rpc.Status.details field, or localized by the client.
r6   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
%GoogleRpcStatus.DetailsValueListEntryi  zA DetailsValueListEntry object.

Messages:
  AdditionalProperty: An additional property for a DetailsValueListEntry
    object.

Fields:
  additionalProperties: Properties of the object. Contains field @type
    with type URL.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)8GoogleRpcStatus.DetailsValueListEntry.AdditionalPropertyi  zAn additional property for a DetailsValueListEntry object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   r=   r   r   Nr>   r   r   r   r?   r     r@   r   r?   r   Tr#   r   NrA   r   r   r   DetailsValueListEntryr    rD   r   r!  r   r   r   Tr#   rE   r   N)r   r   r   r   r   r   rP   r   rB   r!  r   r   r   coder%   r  r   messager   r   r   r   r  r    s|    & !!"89Zi// Z :Z2 
		9+<+<+B+B	C$""#:AM'!!!$'r   r  c                       \ rS rSrSr\R                  " S5      r\R                  " S5      r\R                  " S5      r	\R                  " S5      r
Srg)	r   i  aq  Represents a textual expression in the Common Expression Language (CEL)
syntax. CEL is a C-like expression language. The syntax and semantics of CEL
are documented at https://github.com/google/cel-spec. Example (Comparison):
title: "Summary size limit" description: "Determines if a summary is less
than 100 chars" expression: "document.summary.size() < 100" Example
(Equality): title: "Requestor is owner" description: "Determines if
requestor is the document owner" expression: "document.owner ==
request.auth.claims.email" Example (Logic): title: "Public documents"
description: "Determine whether the document should be publicly visible"
expression: "document.type != 'private' && document.type != 'internal'"
Example (Data Manipulation): title: "Notification string" description:
"Create a notification string with a timestamp." expression: "'New message
received at ' + string(document.create_time)" The exact variables and
functions that may be referenced within an expression are determined by the
service that evaluates it. See the service documentation for additional
information.

Fields:
  description: Optional. Description of the expression. This is a longer
    text which describes the expression, e.g. when hovered over it in a UI.
  expression: Textual representation of an expression in Common Expression
    Language syntax.
  location: Optional. String indicating the location of the expression for
    error reporting, e.g. a file name and a position in the file.
  title: Optional. Title for the expression, i.e. a short string describing
    its purpose. This can be used e.g. in UIs which allow to enter the
    expression.
r   r   rE   rF   r   N)r   r   r   r   r   r   r   rt  
expressionlocationr  r   r   r   r   r   r     sI    : %%a(+$$Q'*""1%(



"%r   r   c                   j   \ rS rSrSr " S S\R                  5      r\R                  " S5       " S S\R                  5      5       r\R                  " S5       " S S	\R                  5      5       r\R                  " S5       " S
 S\R                  5      5       r\R                  " SS5      r\R                   " SS5      r\R                   " SS5      r\R&                  " S5      r\R                   " SS5      r\R                   " S	S5      r\R                   " SS5      r\R&                  " S5      rSrg)r  i  a  Explanation of access level, including the original access level defined
by customers, evaluation results and metadata NextTAG: 12

Enums:
  AccessLevelStateValueValuesEnum: Evaluation state of an access level

Messages:
  NodeMapValue: Map between node.id and cel node Node id: Expr.id
    (google/api/expr/syntax.proto)
  NodeNegTroubleshootingMetadataMapValue: Map between node.id and
    troubleshooting metadata of this node when the state of this access
    level is expected to be not_granted
  NodePosTroubleshootingMetadataMapValue: Map between node.id and
    troubleshooting metadata of this node when the state of this access
    level is expected to be granted

Fields:
  accessLevelState: Evaluation state of an access level
  basicLevelExplanation: A IdentityCaaIntelFrontendBasicLevelExplanation
    attribute.
  customLevelExplanation: A IdentityCaaIntelFrontendCustomLevelExplanation
    attribute.
  name: Resource name for the Access Level. Format:
    `accessPolicies/{policy_id}/accessLevels/{short_name}`
  nodeMap: Map between node.id and cel node Node id: Expr.id
    (google/api/expr/syntax.proto)
  nodeNegTroubleshootingMetadataMap: Map between node.id and troubleshooting
    metadata of this node when the state of this access level is expected to
    be not_granted
  nodePosTroubleshootingMetadataMap: Map between node.id and troubleshooting
    metadata of this node when the state of this access level is expected to
    be granted
  title: Access Level's title
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
NIdentityCaaIntelFrontendAccessLevelExplanation.AccessLevelStateValueValuesEnumi&  a  Evaluation state of an access level

Values:
  ACCESS_LEVEL_STATE_UNSPECIFIED: Reserved
  ACCESS_LEVEL_STATE_GRANTED: The access level state is granted
  ACCESS_LEVEL_STATE_NOT_GRANTED: The access level state is not granted
  ACCESS_LEVEL_STATE_ERROR: Encounter error when evaluating this access
    level. Note that such error is on the critical path that blocks the
    evaluation; e.g. False || -> ACCESS_LEVEL_STATE_NOT_GRANTED True && ->
    ACCESS_LEVEL_STATE_ERROR
  ACCESS_LEVEL_NOT_EXIST: The access level doesn't exist
r   r   r   rE   rF   r   N)r   r   r   r   r   ACCESS_LEVEL_STATE_UNSPECIFIEDACCESS_LEVEL_STATE_GRANTEDACCESS_LEVEL_STATE_NOT_GRANTEDACCESS_LEVEL_STATE_ERRORACCESS_LEVEL_NOT_EXISTr   r   r   r   AccessLevelStateValueValuesEnumr)  &  s'     &'"!"%&" r   r/  r6   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
;IdentityCaaIntelFrontendAccessLevelExplanation.NodeMapValuei9  zMap between node.id and cel node Node id: Expr.id
(google/api/expr/syntax.proto)

Messages:
  AdditionalProperty: An additional property for a NodeMapValue object.

Fields:
  additionalProperties: Additional properties of type NodeMapValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)NIdentityCaaIntelFrontendAccessLevelExplanation.NodeMapValue.AdditionalPropertyiE  zAn additional property for a NodeMapValue object.

Fields:
  key: Name of the additional property.
  value: A IdentityCaaIntelFrontendCelNode attribute.
r   IdentityCaaIntelFrontendCelNoder   r   Nr>   r   r   r   r?   r3  E  s,    
 !!!$c$$%FJer   r?   r   Tr#   r   NrA   r   r   r   NodeMapValuer1  9  s4    	KY.. 	K %112FTXYr   r5  c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
UIdentityCaaIntelFrontendAccessLevelExplanation.NodeNegTroubleshootingMetadataMapValueiR  a[  Map between node.id and troubleshooting metadata of this node when the
state of this access level is expected to be not_granted

Messages:
  AdditionalProperty: An additional property for a
    NodeNegTroubleshootingMetadataMapValue object.

Fields:
  additionalProperties: Additional properties of type
    NodeNegTroubleshootingMetadataMapValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)hIdentityCaaIntelFrontendAccessLevelExplanation.NodeNegTroubleshootingMetadataMapValue.AdditionalPropertyi`  zAn additional property for a NodeNegTroubleshootingMetadataMapValue
object.

Fields:
  key: Name of the additional property.
  value: A IdentityCaaIntelFrontendTroubleshootingMetadata attribute.
r   /IdentityCaaIntelFrontendTroubleshootingMetadatar   r   Nr>   r   r   r   r?   r9  `  -    
 !!!$c$$%VXYZer   r?   r   Tr#   r   NrA   r   r   r   &NodeNegTroubleshootingMetadataMapValuer7  R  4    

[Y.. 
[ %112FTXYr   r<  c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
UIdentityCaaIntelFrontendAccessLevelExplanation.NodePosTroubleshootingMetadataMapValuein  aW  Map between node.id and troubleshooting metadata of this node when the
state of this access level is expected to be granted

Messages:
  AdditionalProperty: An additional property for a
    NodePosTroubleshootingMetadataMapValue object.

Fields:
  additionalProperties: Additional properties of type
    NodePosTroubleshootingMetadataMapValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)hIdentityCaaIntelFrontendAccessLevelExplanation.NodePosTroubleshootingMetadataMapValue.AdditionalPropertyi|  zAn additional property for a NodePosTroubleshootingMetadataMapValue
object.

Fields:
  key: Name of the additional property.
  value: A IdentityCaaIntelFrontendTroubleshootingMetadata attribute.
r   r:  r   r   Nr>   r   r   r   r?   rA  |  r;  r   r?   r   Tr#   r   NrA   r   r   r   &NodePosTroubleshootingMetadataMapValuer?  n  r=  r   rB  r   -IdentityCaaIntelFrontendBasicLevelExplanationr   .IdentityCaaIntelFrontendCustomLevelExplanationrE   rF   rG   rH   rI   rJ   r   N)r   r   r   r   r   r   rO   r/  r   rP   rB   r5  r<  rB  r[   accessLevelStater%   basicLevelExplanationcustomLevelExplanationr   r  nodeMap!nodeNegTroubleshootingMetadataMap!nodePosTroubleshootingMetadataMapr  r   r   r   r   r  r    sD   !F	 & !!"89ZY&& Z :Z0 !!"89Zy/@/@ Z :Z6 !!"89Zy/@/@ Z :Z6 (()JAN#001`bcd$112bdef			q	!$"">15'&/&<&<=egh&i#&/&<&<=egh&i#



"%r   r  c                       \ rS rSrSr\R                  " S5       " S S\R                  5      5       r	\R                  " SS5      rSrg)	rC  i  zThe Explanation of a Basic Level, which contains the explanation in
Struct NextTAG: 2

Messages:
  ExplanationValue: A ExplanationValue object.

Fields:
  explanation: A ExplanationValue attribute.
r6   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
>IdentityCaaIntelFrontendBasicLevelExplanation.ExplanationValuei  zA ExplanationValue object.

Messages:
  AdditionalProperty: An additional property for a ExplanationValue
    object.

Fields:
  additionalProperties: Properties of the object.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)QIdentityCaaIntelFrontendBasicLevelExplanation.ExplanationValue.AdditionalPropertyi  zAn additional property for a ExplanationValue object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   r=   r   r   Nr>   r   r   r   r?   rO    r@   r   r?   r   Tr#   r   NrA   r   r   r   ExplanationValuerM    s4    	AY.. 	A %112FTXYr   rP  r   r   N)r   r   r   r   r   r   rP   r   rB   rP  r%   explanationr   r   r   r   rC  rC    sL     !!"89Z** Z :Z0 &&'91=+r   rC  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " SSSS9r\R                  " S	\R                  R                  S9rS
rg)r4  i  av  Cel node, including evaluation results and metadata NextTAG: 7

Fields:
  endPosition: Optional, it exists if it is CustomLevel Access Level. End
    position of an expression in the original condition, by character, end
    included
  nodeValues: Repeated as one node id may correspond to multiple evaluation
    values. e.g.in comprehension expr, [1,2,3].all(x, x > 0), call_expr
    "_>_" has 3 values corresponding to the evaluation of list values
    individually sequentially
  startPosition: Optional, it exists if it is CustomLevel Access Level.
    Start position of an expression in the original condition, by character
r   r   !IdentityCaaIntelFrontendNodeValuer   Tr#   rE   r   N)r   r   r   r   r   r   r   r   r   endPositionr%   
nodeValuesstartPositionr   r   r   r   r4  r4    s[     &&q)2C2C2I2IJ+%%&I1W[\*((I4E4E4K4KL-r   r4  c                   b    \ rS rSrSr\R                  " SS5      r\R                  " S5      r	Sr
g)rD  i  zThe Explanation of a Custom Level, which contains the original cel
expression and the custom level explanation tree NextTAG: 3

Fields:
  explanation: Custom Level Explanation Tree
  expression: The raw cel expression from customers
'IdentityCaaIntelFrontendCustomLevelNoder   r   r   N)r   r   r   r   r   r   r%   rQ  r   r%  r   r   r   r   rD  rD    s-     &&'PRST+$$Q'*r   rD  c                       \ rS rSrSr " S S\R                  5      r\R                  " S5      r	\R                  " SS5      r\R                  " S SSS	9rS
rg)rX  i  a  Custom Level Node Tree for the Logical Expression Tree NextTAG: 4

Enums:
  NodeTypeValueValuesEnum: Node type, indicate if it's an expression or
    AND/OR/NOT Logical Operator Node

Fields:
  nodeId: Node id, used to map to its NodeValue and Troubleshooting metadata
  nodeType: Node type, indicate if it's an expression or AND/OR/NOT Logical
    Operator Node
  nodes: Child nodes
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
?IdentityCaaIntelFrontendCustomLevelNode.NodeTypeValueValuesEnumi  aI  Node type, indicate if it's an expression or AND/OR/NOT Logical
Operator Node

Values:
  CUSTOM_LEVEL_NODE_UNSPECIFIED: Reserved
  CUSTOM_LEVEL_NODE_EXPRESSION: Custom level Expression node
  CUSTOM_LEVEL_NODE_AND: Custom level AND node
  CUSTOM_LEVEL_NODE_OR: Custom level OR node
  CUSTOM_LEVEL_NODE_NOT: Custom level NOT node
r   r   r   rE   rF   r   N)r   r   r   r   r   CUSTOM_LEVEL_NODE_UNSPECIFIEDCUSTOM_LEVEL_NODE_EXPRESSIONCUSTOM_LEVEL_NODE_ANDCUSTOM_LEVEL_NODE_ORCUSTOM_LEVEL_NODE_NOTr   r   r   r   NodeTypeValueValuesEnumr[    s'    	 %&!#$ r   ra  r   r   rE   Tr#   r   N)r   r   r   r   r   r   rO   ra  r   nodeIdr[   nodeTyper%   nodesr   r   r   r   rX  rX    sR    	 " !!!$&  !:A>(

 
 !JAX\
]%r   rX  c                   *   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r	\R                  " SS	S
S9r\R                  " SS5      r\R                  " SSS
S9r\R                  " SS5      rSrg)rS  i   a  Evaluation result of a cel AST node NextTAG: 7

Enums:
  CriticalNodeErrorsValueListEntryValuesEnum:
  NodeStateValueValuesEnum: Evaluation state of this node
  NonCriticalNodeErrorsValueListEntryValuesEnum:

Fields:
  criticalNodeErrors: The errors included depend on the context. It is
    applicable when node_state is NODE_STATE_ERROR
  nodeState: Evaluation state of this node
  nonCriticalNodeErrors: The errors included depend on the context. Note:
    ACCESS_LEVEL_STATE_GRANTED/ACCESS_LEVEL_STATE_NOT_GRANTED access levels
    may have non_critical_node_errors errors underneath that don't block the
    evaluation.
  value: Evaluation result of this node, It is applicable when node_state is
    NODE_STATE_NORMAL.
c                   X    \ rS rSrSrSrSrSrSrSr	Sr
S	rS
rSrSrSrSrSrSrSrSrSrg)LIdentityCaaIntelFrontendNodeValue.CriticalNodeErrorsValueListEntryValuesEnumi  a  CriticalNodeErrorsValueListEntryValuesEnum enum type.

Values:
  NODE_ERROR_UNSPECIFIED: Reserved
  NODE_ERROR_INTERNAL_ERROR: Internal error If there is no matching error
    below, use it by default
  NODE_ERROR_DEVICE_NOT_FOUND: Device not found
  NODE_ERROR_DEVICE_STALE: Device is out of sync
  NODE_ERROR_DEVICE_CROSS_ORG: It is a cross-org device
  NODE_ERROR_DEVICE_INFO_NOT_AUTHORIZED: Caller doesn't have permission to
    device info
  NODE_ERROR_INVALID_SOURCE_IP: Source ip is not valid, from inIpRange
    function
  NODE_ERROR_INVALID_IP_SUBNETS: Ip subnets are not valid, from inIpRange
    function
  NODE_ERROR_INVALID_DEVICE_VERSION: Device min verion is not valid, from
    versionAtLeast function
  NODE_ERROR_NO_MATCHING_OVERLOADED_FUNC: Expr error from a supported
    function type with invalid parameters e.g. 1 == true
  NODE_ERROR_AUTH_SESSION_INFO_NOT_AUTHORIZED: Caller doesn't have
    permission to auth session info
  NODE_ERROR_NO_BCE_LICENSE: User is not assigned a BCE license.
  NODE_ERROR_INVALID_NETWORK: The network in the list for `in_vpc_network`
    is not valid.
  NODE_ERROR_UNRECOGNIZED_NETWORK: The network in the request for
    `in_vpc_network` is missing.
  NODE_ERROR_UNMATCHED_NETWORK_PROJECT: The network project in the request
    for `in_vpc_network` does not match with the project in policy.
  NODE_ERROR_UNRECOGNIZED_NETWORK_PROJECT: The network project in the
    request for `in_vpc_network` is missing. TODO(b/382592764) Add support
    for NODE_ERROR_UNKNOWN_REGION
r   r   r   rE   rF   rG   rH   rI   rJ   rK   rL   rM   rN   r        r   Nr   r   r   r   r   NODE_ERROR_UNSPECIFIEDNODE_ERROR_INTERNAL_ERRORNODE_ERROR_DEVICE_NOT_FOUNDNODE_ERROR_DEVICE_STALENODE_ERROR_DEVICE_CROSS_ORG%NODE_ERROR_DEVICE_INFO_NOT_AUTHORIZEDNODE_ERROR_INVALID_SOURCE_IPNODE_ERROR_INVALID_IP_SUBNETS!NODE_ERROR_INVALID_DEVICE_VERSION&NODE_ERROR_NO_MATCHING_OVERLOADED_FUNC+NODE_ERROR_AUTH_SESSION_INFO_NOT_AUTHORIZEDNODE_ERROR_NO_BCE_LICENSENODE_ERROR_INVALID_NETWORKNODE_ERROR_UNRECOGNIZED_NETWORK$NODE_ERROR_UNMATCHED_NETWORK_PROJECT'NODE_ERROR_UNRECOGNIZED_NETWORK_PROJECTr   r   r   r   *CriticalNodeErrorsValueListEntryValuesEnumrg    j    @  !"#"#,-)#$ $%!()%-.*24/ "!#&(#+-(.0+r   r{  c                   $    \ rS rSrSrSrSrSrSrg):IdentityCaaIntelFrontendNodeValue.NodeStateValueValuesEnumiF  a  Evaluation state of this node

Values:
  NODE_STATE_UNSPECIFIED: Reserved
  NODE_STATE_NORMAL: The node state is normal, which means the evaluation
    of this node succeeds However, it doesn't mean the evaluated result is
    a boolean value.
  NODE_STATE_ERROR: Encounter error when evaluating the result of this
    node. Only return error if it is in the critical path of evaluation.
    For example, `( || true) && ` -> ``, ` || true` -> `true` `.foo` -> ``
    `foo()` -> `` ` + 1` -> ``
r   r   r   r   N)	r   r   r   r   r   NODE_STATE_UNSPECIFIEDNODE_STATE_NORMALNODE_STATE_ERRORr   r   r   r   NodeStateValueValuesEnumr~  F  s     r   r  c                   X    \ rS rSrSrSrSrSrSrSr	Sr
S	rS
rSrSrSrSrSrSrSrSrSrg)OIdentityCaaIntelFrontendNodeValue.NonCriticalNodeErrorsValueListEntryValuesEnumiW  a  NonCriticalNodeErrorsValueListEntryValuesEnum enum type.

Values:
  NODE_ERROR_UNSPECIFIED: Reserved
  NODE_ERROR_INTERNAL_ERROR: Internal error If there is no matching error
    below, use it by default
  NODE_ERROR_DEVICE_NOT_FOUND: Device not found
  NODE_ERROR_DEVICE_STALE: Device is out of sync
  NODE_ERROR_DEVICE_CROSS_ORG: It is a cross-org device
  NODE_ERROR_DEVICE_INFO_NOT_AUTHORIZED: Caller doesn't have permission to
    device info
  NODE_ERROR_INVALID_SOURCE_IP: Source ip is not valid, from inIpRange
    function
  NODE_ERROR_INVALID_IP_SUBNETS: Ip subnets are not valid, from inIpRange
    function
  NODE_ERROR_INVALID_DEVICE_VERSION: Device min verion is not valid, from
    versionAtLeast function
  NODE_ERROR_NO_MATCHING_OVERLOADED_FUNC: Expr error from a supported
    function type with invalid parameters e.g. 1 == true
  NODE_ERROR_AUTH_SESSION_INFO_NOT_AUTHORIZED: Caller doesn't have
    permission to auth session info
  NODE_ERROR_NO_BCE_LICENSE: User is not assigned a BCE license.
  NODE_ERROR_INVALID_NETWORK: The network in the list for `in_vpc_network`
    is not valid.
  NODE_ERROR_UNRECOGNIZED_NETWORK: The network in the request for
    `in_vpc_network` is missing.
  NODE_ERROR_UNMATCHED_NETWORK_PROJECT: The network project in the request
    for `in_vpc_network` does not match with the project in policy.
  NODE_ERROR_UNRECOGNIZED_NETWORK_PROJECT: The network project in the
    request for `in_vpc_network` is missing. TODO(b/382592764) Add support
    for NODE_ERROR_UNKNOWN_REGION
r   r   r   rE   rF   rG   rH   rI   rJ   rK   rL   rM   rN   r  rh  ri  r   Nrj  r   r   r   -NonCriticalNodeErrorsValueListEntryValuesEnumr  W  r|  r   r  r   Tr#   r   rE   r"   rF   r   N)r   r   r   r   r   r   rO   r{  r  r  r[   criticalNodeErrors	nodeStatenonCriticalNodeErrorsr%   r   r   r   r   r   rS  rS     s    &019>> 01d "01inn 01d !**+WYZeij!!"<a@)#--.]_`kop

 
 !5q
9%r   rS  c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS5      rS	rg
)r:  i  a  NextTAG: 3

Enums:
  CriticalLevelValueValuesEnum: If it is a critical failed node that blocks
    the expected state of this access level. It is valid only for boolean
    expression nodes and when the node's expected value doesn't equal to
    actual value
  LogicalNodeExpectedValueValueValuesEnum: If it is a logical node, it will
    be TRUE or FALSE.

Fields:
  criticalLevel: If it is a critical failed node that blocks the expected
    state of this access level. It is valid only for boolean expression
    nodes and when the node's expected value doesn't equal to actual value
  logicalNodeExpectedValue: If it is a logical node, it will be TRUE or
    FALSE.
c                   $    \ rS rSrSrSrSrSrSrg)LIdentityCaaIntelFrontendTroubleshootingMetadata.CriticalLevelValueValuesEnumi  a  If it is a critical failed node that blocks the expected state of this
access level. It is valid only for boolean expression nodes and when the
node's expected value doesn't equal to actual value

Values:
  CRITICAL_LEVEL_UNSPECIFIED: reserved
  CRITICAL_LEVEL_LOW: The node is not on the critical path to the expected
    state of this access level.
  CRITICAL_LEVEL_HIGH: The node is on the critical path to the expected
    state of this access level.
r   r   r   r   N)	r   r   r   r   r   CRITICAL_LEVEL_UNSPECIFIEDCRITICAL_LEVEL_LOWCRITICAL_LEVEL_HIGHr   r   r   r   CriticalLevelValueValuesEnumr    s    
 "#r   r  c                   $    \ rS rSrSrSrSrSrSrg)WIdentityCaaIntelFrontendTroubleshootingMetadata.LogicalNodeExpectedValueValueValuesEnumi  zIf it is a logical node, it will be TRUE or FALSE.

Values:
  LOGICAL_NODE_EXPECTED_VALUE_UNSPECIFIED: Reserved
  LOGICAL_NODE_EXPECTED_VALUE_TRUE: True
  LOGICAL_NODE_EXPECTED_VALUE_FALSE: False
r   r   r   r   N)	r   r   r   r   r   'LOGICAL_NODE_EXPECTED_VALUE_UNSPECIFIED LOGICAL_NODE_EXPECTED_VALUE_TRUE!LOGICAL_NODE_EXPECTED_VALUE_FALSEr   r   r   r   'LogicalNodeExpectedValueValueValuesEnumr    s     /0+'($()%r   r  r   r   r   N)r   r   r   r   r   r   rO   r  r  r[   criticalLevellogicalNodeExpectedValuer   r   r   r   r:  r:    sQ    $Y^^  
*	 
* %%&DaH-&001Z\]^r   r:  c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " S5      r\R                  " SS	S
S9r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R$                  " SSS9r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      rSrg)StandardQueryParametersi  a  Query parameters accepted by all methods.

Enums:
  FXgafvValueValuesEnum: V1 error format.
  AltValueValuesEnum: Data format for response.

Fields:
  f__xgafv: V1 error format.
  access_token: OAuth access token.
  alt: Data format for response.
  callback: JSONP
  fields: Selector specifying which fields to include in a partial response.
  key: API key. Your API key identifies your project and provides you with
    API access, quota, and reports. Required unless you provide an OAuth 2.0
    token.
  oauth_token: OAuth 2.0 token for the current user.
  prettyPrint: Returns response with indentations and line breaks.
  quotaUser: Available to use for quota purposes for server-side
    applications. Can be any arbitrary string assigned to a user, but should
    not exceed 40 characters.
  trace: A tracing token of the form "token:<tokenid>" to include in api
    requests.
  uploadType: Legacy upload protocol for media (e.g. "media", "multipart").
  upload_protocol: Upload protocol for media (e.g. "raw", "multipart").
c                   $    \ rS rSrSrSrSrSrSrg)*StandardQueryParameters.AltValueValuesEnumi  zData format for response.

Values:
  json: Responses with Content-Type of application/json
  media: Media download with context-dependent Content-Type
  proto: Responses with Content-Type of application/x-protobuf
r   r   r   r   N)	r   r   r   r   r   jsonmediaprotor   r   r   r   AltValueValuesEnumr    s     DEEr   r  c                        \ rS rSrSrSrSrSrg)-StandardQueryParameters.FXgafvValueValuesEnumi  zFV1 error format.

Values:
  _1: v1 error format
  _2: v2 error format
r   r   r   N)r   r   r   r   r   _1_2r   r   r   r   FXgafvValueValuesEnumr    s     
B	
Br   r  r   r   rE   r  )defaultrF   rG   rH   rI   rJ   TrK   rL   rM   rN   r   N)r   r   r   r   r   r   rO   r  r  r[   f__xgafvr   access_tokenaltcallbackfieldsr.   oauth_tokenrQ   prettyPrint	quotaUsertrace
uploadTypeupload_protocolr   r   r   r   r  r    s    4
9>> 
inn    !8!<(&&q),0!VD#""1%(  #&a #%%a(+&&q$7+##A&)



#%$$R(*))"-/r   r  ru  inr  z$.xgafvr  1r  2N)sr   
__future__r   apitools.base.protorpcliter   r   apitools.base.pyr   r   packagerB   r	   r    r(   r*   r"   rc   rq   r   r   r   r   r   r   r   r   r   r   r   r   r  r  r)  r:  r2  r   rj  r$  rx  r  r  r  r  r  r  r  r  r  r  r  r"  r.  rW  ri  r|  r  r  r  r  r  r  r/  r  r  r  r  r  r  r  r  r"  rC  rD  rE  rV  rF  rf  rd  ry  r~  rp  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r   r  rC  r4  rD  rX  rS  r:  r  AddCustomJsonFieldMappingAddCustomJsonEnumMappingr  r   r   r   <module>r     s  
 ' < % ( !	EY.. 	EJY.. J	SI-- 	S
:!2!2 
:FM** FMRK)2C2C K<PK`i`q`q PKf2hqhyhy 2 'iriziz  'F!'9;L;L !'HI]yGXGX I]X:A_h_p_p :AzEAiFWFW EAPl	@Q@Q l,"&IL]L] "&J#IDUDU #DyGXGX D&"	HYHY "6=IDUDU ="=S\SdSd =&KAYEVEV KA\GB9CTCT GBT@Aajarar @AF2A^g^o^o 2Aj]AIDUDU ]A@W~9CTCT W~tYAYEVEV YAxMAIL]L] MA`HA)BSBS HAV"GIZIZ "GJpM	@Q@Q pMf>[QZQbQb >[B6AiFWFW 6ArHAIDUDU HAV.IL]L] .0tYM^M^ 0tf&wT]TeTe &wR?/)J[J[ ?/D$EyGXGX $EN.oV_VgVg .obhkT]TeTe hkVQPYPaPa Q@<iW`WhWh <i~ikU^UfUf ikX.	HYHY .$e_h_p_p e@g`i`q`q g@diN_N_ dHHYM^M^ HHV'XaXiXi '	8YEVEV 	8AY^g^o^o AYH[XaXiXi [ 2`i`q`q 2Lhajarar Lh^A]f]n]n A@%Y.. %:!=	 1 1 !=HV"** V"r@39,, @3FR9,, R0KI,=,= 0Kf$):): $6#I4E4E #!=I,=,= !=HSG	)) SGl28i'' 28j/I$5$5 />iE)++ iEXN)	)) N)b)I-- ){)y00 {)| &Y%6%6  &F>(y/@/@ >(Bci6G6G c %693D3D %6PU19;L;L U1p&GARAR &GR)YM^M^ )&J9K\K\ JZ#YM^M^ #<&YM^M^ &6!2IZIZ !2H/@IL]L] /@d#iN_N_ #8&iN_N_ &:2)J[J[ 20(yO`O` (	,^g^o^o 	,0V_VgVg 0$\#9;L;L \#~0%i'' 0%f!#Y&& !#HO#Y5F5F O#d$>I4E4E $>NMi&7&7 M(
(Y5F5F 
(!^i.?.? !^HL:	(9(9 L:^0_i6G6G 0_f<.i// <.~ 	 " "UD"  " "Z4  ! !114>  ! !114>r   