
    l                       S r SSKJr  SSKJr  SSKJr  SSKJr  Sr	 " S S\R                  5      r " S	 S
\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r " S S \R                  5      r " S! S"\R                  5      r " S# S$\R                  5      r " S% S&\R                  5      r " S' S(\R                  5      r " S) S*\R                  5      r " S+ S,\R                  5      r " S- S.\R                  5      r " S/ S0\R                  5      r " S1 S2\R                  5      r  " S3 S4\R                  5      r! " S5 S6\R                  5      r" " S7 S8\R                  5      r# " S9 S:\R                  5      r$ " S; S<\R                  5      r% " S= S>\R                  5      r& " S? S@\R                  5      r' " SA SB\R                  5      r( " SC SD\R                  5      r) " SE SF\R                  5      r* " SG SH\R                  5      r+ " SI SJ\R                  5      r, " SK SL\R                  5      r- " SM SN\R                  5      r. " SO SP\R                  5      r/ " SQ SR\R                  5      r0 " SS ST\R                  5      r1 " SU SV\R                  5      r2 " SW SX\R                  5      r3 " SY SZ\R                  5      r4 " S[ S\\R                  5      r5 " S] S^\R                  5      r6 " S_ S`\R                  5      r7 " Sa Sb\R                  5      r8 " Sc Sd\R                  5      r9 " Se Sf\R                  5      r: " Sg Sh\R                  5      r; " Si Sj\R                  5      r< " Sk Sl\R                  5      r= " Sm Sn\R                  5      r> " So Sp\R                  5      r? " Sq Sr\R                  5      r@ " Ss St\R                  5      rA " Su Sv\R                  5      rB " Sw Sx\R                  5      rC " Sy Sz\R                  5      rD " S{ S|\R                  5      rE " S} S~\R                  5      rF " S S\R                  5      rG " S S\R                  5      rH " S S\R                  5      rI " S S\R                  5      rJ " S S\R                  5      rK " S S\R                  5      rL " S S\R                  5      rM " S S\R                  5      rN " S S\R                  5      rO " S S\R                  5      rP " S S\R                  5      rQ " S S\R                  5      rR " S S\R                  5      rS " S S\R                  5      rT " S S\R                  5      rU " S S\R                  5      rV " S S\R                  5      rW " S S\R                  5      rX " S S\R                  5      rY " S S\R                  5      rZ " S S\R                  5      r[ " S S\R                  5      r\ " S S\R                  5      r] " S S\R                  5      r^ " S S\R                  5      r_ " S S\R                  5      r` " S S\R                  5      ra " S S\R                  5      rb " S S\R                  5      rc " S S\R                  5      rd " S S\R                  5      re " S S\R                  5      rf " S S\R                  5      rg " S S\R                  5      rh " S S\R                  5      ri " S S\R                  5      rj " S S\R                  5      rk " S S\R                  5      rl " S S\R                  5      rm " S S\R                  5      rn " S S\R                  5      ro " S S\R                  5      rp " S S\R                  5      rq " S S\R                  5      rr " S S\R                  5      rs " S S\R                  5      rt " S S\R                  5      ru " S S\R                  5      rv " S S\R                  5      rw " S S\R                  5      rx " S S\R                  5      ry " S S\R                  5      rz " S S\R                  5      r{ " S S\R                  5      r| " S S\R                  5      r} " S S\R                  5      r~\R                  " \{SS5        \GR                   " \{GR                  SS5        \GR                   " \{GR                  SS5        g)a  Generated message classes for securitycentermanagement version v1.

Management API for Security Command Center, a built-in security and risk
management solution for Google Cloud. Use this API to programmatically update
the settings and configuration of Security Command Center.
    )absolute_import)messages)encoding)extra_typessecuritycentermanagementc                   `    \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	Sr
g	)
AuditConfig   aw  Specifies the audit configuration for a service. The configuration
determines which permission types are logged, and what identities, if any,
are exempted from logging. An AuditConfig must have one or more
AuditLogConfigs. If there are AuditConfigs for both `allServices` and a
specific service, the union of the two AuditConfigs is used for that
service: the log_types specified in each AuditConfig are enabled, and the
exempted_members in each AuditLogConfig are exempted. Example Policy with
multiple AuditConfigs: { "audit_configs": [ { "service": "allServices",
"audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [
"user:jose@example.com" ] }, { "log_type": "DATA_WRITE" }, { "log_type":
"ADMIN_READ" } ] }, { "service": "sampleservice.googleapis.com",
"audit_log_configs": [ { "log_type": "DATA_READ" }, { "log_type":
"DATA_WRITE", "exempted_members": [ "user:aliya@example.com" ] } ] } ] } For
sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
logging. It also exempts `jose@example.com` from DATA_READ logging, and
`aliya@example.com` from DATA_WRITE logging.

Fields:
  auditLogConfigs: The configuration for logging of each type of permission.
  service: Specifies a service that will be enabled for audit logging. For
    example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
    `allServices` is a special value that covers all services.
AuditLogConfig   Trepeated    N)__name__
__module____qualname____firstlineno____doc__	_messagesMessageFieldauditLogConfigsStringFieldservice__static_attributes__r       mlib/googlecloudsdk/generated_clients/apis/securitycentermanagement/v1/securitycentermanagement_v1_messages.pyr	   r	      s.    0 **+;QN/!!!$'r   r	   c                       \ rS rSrSr " S S\R                  5      r\R                  " SSS9r	\R                  " SS5      rS	rg
)r   0   aR  Provides the configuration for logging a type of permissions. Example: {
"audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [
"user:jose@example.com" ] }, { "log_type": "DATA_WRITE" } ] } This enables
'DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from
DATA_READ logging.

Enums:
  LogTypeValueValuesEnum: The log type that this config enables.

Fields:
  exemptedMembers: Specifies the identities that do not cause logging for
    this type of permission. Follows the same format of Binding.members.
  logType: The log type that this config enables.
c                   (    \ rS rSrSrSrSrSrSrSr	g)	%AuditLogConfig.LogTypeValueValuesEnum@   a  The log type that this config enables.

Values:
  LOG_TYPE_UNSPECIFIED: Default case. Should never be this.
  ADMIN_READ: Admin reads. Example: CloudIAM getIamPolicy
  DATA_WRITE: Data writes. Example: CloudSQL Users create
  DATA_READ: Data reads. Example: CloudSQL Users list
r   r   r      r   N)
r   r   r   r   r   LOG_TYPE_UNSPECIFIED
ADMIN_READ
DATA_WRITE	DATA_READr   r   r   r   LogTypeValueValuesEnumr!   @   s     JJIr   r(   r   Tr   r   r   N)r   r   r   r   r   r   Enumr(   r   exemptedMembers	EnumFieldlogTyper   r   r   r   r   r   0   s>    y~~  ))!d;/ 8!<'r   r   c                       \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " S5      rSrg)	BillingMetadataR   a  Response message for SecurityCenterManagement.GetBillingMetadata.

Enums:
  BillingTierValueValuesEnum: The billing tier of the resource.

Fields:
  billingTier: The billing tier of the resource.
  name: Identifier. The full resource name of the billingMetadata, in one of
    the following formats: *
    `organizations/{organization}/locations/{location}/billingMetadata` *
    `projects/{project}/locations/{location}/billingMetadata`
c                   (    \ rS rSrSrSrSrSrSrSr	g)	*BillingMetadata.BillingTierValueValuesEnum`   zThe billing tier of the resource.

Values:
  BILLING_TIER_UNSPECIFIED: Default value. This value is unused.
  STANDARD: Standard free tier.
  PREMIUM: Security Command Center Premium.
  ENTERPRISE: Security Command Center Enterprise.
r   r   r   r#   r   N)
r   r   r   r   r   BILLING_TIER_UNSPECIFIEDSTANDARDPREMIUM
ENTERPRISEr   r   r   r   BillingTierValueValuesEnumr1   `   s      !HGJr   r7   r   r   r   N)r   r   r   r   r   r   r)   r7   r+   billingTierr   namer   r   r   r   r.   r.   R   s<    9>>  ##$@!D+			q	!$r   r.   c                       \ rS rSrSrSrg)CancelOperationRequestr   z3The request message for Operations.CancelOperation.r   Nr   r   r   r   r   r   r   r   r   r;   r;   r   s    <r   r;   c                   <    \ rS rSrSr\R                  " S5      rSrg)CelPolicySpecv   a  YAML-based rule that uses CEL, which supports the declaration of
variables and a filtering predicate. A vulnerable resource is emitted if the
evaluation is false. Given: 1) the resource types as: - resource_types:
"compute.googleapis.com/Instance" - resource_types:
"compute.googleapis.com/Firewall" 2) the CEL policy spec as: name:
bad_instance resource_filters: - name: instance resource_type:
compute.googleapis.com/Instance filter: > instance.status == 'RUNNING' &&
'public' in instance.tags.items - name: firewall resource_type:
compute.googleapis.com/Firewall filter: > firewall.direction == 'INGRESS' &&
!firewall.disabled && firewall.allowed.exists(rule,
rule.IPProtocol.upperAscii() in ['TCP', 'ALL'] && rule.ports.exists(port,
network.portsInRange(port, '11-256'))) rule: match: - predicate: >
instance.networkInterfaces.exists(net, firewall.network == net.network)
output: > {'message': 'Compute instance with publicly accessible ports',
'instance': instance.name} Users are able to join resource types together
using the exact format as Kubernetes Validating Admission policies.

Fields:
  spec: Optional. The CEL policy to evaluate to produce findings. A finding
    is generated when the policy validation evaluates to false.
r   r   N)	r   r   r   r   r   r   r   specr   r   r   r   r?   r?   v   s    , 
		q	!$r   r?   c                   H   \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " SS5      r
\R                  " S	5      r\R                  " S
S5      r\R                  " S5      r\R                  " SS5      r\R                   " SS5      rSrg)CustomConfig   a  Defines the properties in a custom module configuration for Security
Health Analytics. Use the custom module configuration to create custom
detectors that generate custom findings for resources that you specify.

Enums:
  SeverityValueValuesEnum: Optional. The severity to assign to findings
    generated by the module.

Fields:
  celPolicy: Optional. The CEL policy spec attached to the custom module.
  customOutput: Optional. Custom output properties.
  description: Optional. Text that describes the vulnerability or
    misconfiguration that the custom module detects. This explanation is
    returned with each finding instance to help investigators understand the
    detected issue. The text must be enclosed in quotation marks.
  predicate: Optional. The Common Expression Language (CEL) expression to
    evaluate to produce findings. When the expression evaluates to `true`
    against a resource, a finding is generated.
  recommendation: Optional. An explanation of the recommended steps that
    security teams can take to resolve the detected issue. This explanation
    is returned with each finding generated by this module.
  resourceSelector: Optional. The Cloud Asset Inventory resource types that
    the custom module operates on. For information about resource types, see
    [Supported asset types](https://cloud.google.com/asset-
    inventory/docs/supported-asset-types). Each custom module can specify up
    to 5 resource types.
  severity: Optional. The severity to assign to findings generated by the
    module.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
$CustomConfig.SeverityValueValuesEnum   zOptional. The severity to assign to findings generated by the module.

Values:
  SEVERITY_UNSPECIFIED: Default value. This value is unused.
  CRITICAL: Critical severity.
  HIGH: High severity.
  MEDIUM: Medium severity.
  LOW: Low severity.
r   r   r   r#      r   Nr   r   r   r   r   SEVERITY_UNSPECIFIEDCRITICALHIGHMEDIUMLOWr   r   r   r   SeverityValueValuesEnumrF      s#     HDF
Cr   rO   r?   r   CustomOutputSpecr   r#   ExprrH      ResourceSelector      r   N)r   r   r   r   r   r   r)   rO   r   	celPolicycustomOutputr   description	predicaterecommendationresourceSelectorr+   severityr   r   r   r   rC   rC      s    <	   $$_a8)''(:A>,%%a(+$$VQ/)((+.++,>B  !:A>(r   rC   c                       \ rS rSrSr\R                  " S5      r\R                  " SS5      r	\R                  " S5      r
\R                  " SS5      rSrg	)
CustomModuleValidationError   a  An error encountered while validating the uploaded configuration of an
Event Threat Detection custom module.

Fields:
  description: A human-readable description of the error.
  end: The end position of the error in the uploaded text version of the
    module. Omitted if no specific position applies, or if the position
    could not be computed.
  fieldPath: The path, in [RFC 6901: JSON
    Pointer](https://datatracker.ietf.org/doc/html/rfc6901) format, to the
    field that failed validation. Omitted if no specific field is affected.
  start: The initial position of the error in the uploaded text version of
    the module. Omitted if no specific position applies, or if the position
    could not be computed.
r   Positionr   r#   rH   r   N)r   r   r   r   r   r   r   rX   r   end	fieldPathstartr   r   r   r   r^   r^      sM      %%a(+z1-###A&)

 
 Q
/%r   r^   c                   <    \ rS rSrSr\R                  " SSSS9rSrg)	rP      a;  A set of optional name-value pairs that define custom source properties
to return with each finding that is generated by the custom module. The
custom source properties that are defined here are included in the finding.

Fields:
  properties: Optional. A list of custom output properties to add to the
    finding.
Propertyr   Tr   r   N)	r   r   r   r   r   r   r   
propertiesr   r   r   r   rP   rP      s     %%j!dC*r   rP   c                   r   \ rS rSrSr " S S\R                  5      r\R                  " S5       " S S\R                  5      5       r\R                  " SS5      r\R                  " S	5      r\R                  " S
5      r\R"                  " SS5      r\R                  " S5      r\R                  " S5      rSrg))EffectiveEventThreatDetectionCustomModule   a  The representation of an EventThreatDetectionCustomModule at a given
level, taking hierarchy into account and resolving various fields
accordingly. For example, if the module is enabled at the ancestor level,
then effective modules at all descendant levels will have their enablement
state set to `ENABLED`. Similarly, if `module.inherited` is set, then the
effective module's configuration will reflect the ancestor's configuration.

Enums:
  EnablementStateValueValuesEnum: Output only. The effective state of
    enablement for the module at the given level of the hierarchy.

Messages:
  ConfigValue: Output only. Configuration for the effective module.

Fields:
  config: Output only. Configuration for the effective module.
  description: Output only. A description of the module.
  displayName: Output only. The human-readable name of the module.
  enablementState: Output only. The effective state of enablement for the
    module at the given level of the hierarchy.
  name: Identifier. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/effectiveEventThreatDetectionCustomModules/{custom
    _module}` * `folders/{folder}/locations/{location}/effectiveEventThreatD
    etectionCustomModules/{custom_module}` * `projects/{project}/locations/{
    location}/effectiveEventThreatDetectionCustomModules/{custom_module}`
  type: Output only. Type for the module (for example,
    `CONFIGURABLE_BAD_IP`).
c                   $    \ rS rSrSrSrSrSrSrg)HEffectiveEventThreatDetectionCustomModule.EnablementStateValueValuesEnumi  a  Output only. The effective state of enablement for the module at the
given level of the hierarchy.

Values:
  ENABLEMENT_STATE_UNSPECIFIED: Default value. This value is unused.
  ENABLED: The module is enabled at the given level.
  DISABLED: The module is disabled at the given level.
r   r   r   r   N	r   r   r   r   r   ENABLEMENT_STATE_UNSPECIFIEDENABLEDDISABLEDr   r   r   r   EnablementStateValueValuesEnumrl          $% GHr   rq   additionalPropertiesc                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
5EffectiveEventThreatDetectionCustomModule.ConfigValuei  zOutput only. Configuration for the effective module.

Messages:
  AdditionalProperty: An additional property for a ConfigValue object.

Fields:
  additionalProperties: Properties of the object.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)HEffectiveEventThreatDetectionCustomModule.ConfigValue.AdditionalPropertyi#  An additional property for a ConfigValue object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   extra_types.JsonValuer   r   Nr   r   r   r   r   r   r   keyr   valuer   r   r   r   AdditionalPropertyrw   #  ,    
 !!!$c$$%<a@er   r}   r   Tr   r   Nr   r   r   r   r   r   Messager}   r   rs   r   r   r   r   ConfigValueru     s4    	AY.. 	A %112FTXYr   r   r   r   r#   rH   rR   rT   r   N)r   r   r   r   r   r   r)   rq   r   MapUnrecognizedFieldsr   r   r   configr   rX   displayNamer+   enablementStater9   typer   r   r   r   ri   ri      s    <y~~  !!"89ZI%% Z :Z. !!-3&%%a(+%%a(+''(H!L/			q	!$			q	!$r   ri   c                       \ rS rSrSr " S S\R                  5      r\R                  " SS5      r	\R                  " S5      r\R                  " SS5      r\R                  " S	5      rS
rg),EffectiveSecurityHealthAnalyticsCustomModulei8  a  The representation of a Security Health Analytics custom module at a
specified level of the resource hierarchy: organization, folder, or project.
If a custom module is inherited from an ancestor organization or folder,
then the enablement state is set to the value that is effective in the
parent, not to `INHERITED`. For example, if the module is enabled in an
organization or folder, then the effective enablement state for the module
is `ENABLED` in all descendant folders or projects.

Enums:
  EnablementStateValueValuesEnum: Output only. The effective enablement
    state for the module at the given level of the hierarchy.

Fields:
  customConfig: Output only. The user-specified configuration for the
    module.
  displayName: Output only. The display name for the custom module. The name
    must be between 1 and 128 characters, start with a lowercase letter, and
    contain alphanumeric characters or underscores only.
  enablementState: Output only. The effective enablement state for the
    module at the given level of the hierarchy.
  name: Identifier. The full resource name of the custom module, in one of
    the following formats: * `organizations/organization/{location}/effectiv
    eSecurityHealthAnalyticsCustomModules/{custom_module}` * `folders/folder
    /{location}/effectiveSecurityHealthAnalyticsCustomModules/{custom_module
    }` * `projects/project/{location}/effectiveSecurityHealthAnalyticsCustom
    Modules/{custom_module}`
c                   $    \ rS rSrSrSrSrSrSrg)KEffectiveSecurityHealthAnalyticsCustomModule.EnablementStateValueValuesEnumiU  a  Output only. The effective enablement state for the module at the
given level of the hierarchy.

Values:
  ENABLEMENT_STATE_UNSPECIFIED: Default value. This value is unused.
  ENABLED: The module is enabled at the given level.
  DISABLED: The module is disabled at the given level.
r   r   r   r   Nrm   r   r   r   rq   r   U  rr   r   rq   rC   r   r   r#   rH   r   N)r   r   r   r   r   r   r)   rq   r   customConfigr   r   r+   r   r9   r   r   r   r   r   r   8  s^    8y~~  '':,%%a(+''(H!L/			q	!$r   r   c                       \ rS rSrSrSrg)Emptyih  a  A generic empty message that you can re-use to avoid defining duplicated
empty messages in your APIs. A typical example is to use it as the request
or the response type of an API method. For instance: service Foo { rpc
Bar(google.protobuf.Empty) returns (google.protobuf.Empty); }
r   Nr=   r   r   r   r   r   h  s    r   r   c                      \ rS rSrSr " S S\R                  5      r\R                  " S5       " S S\R                  5      5       r\R                  " S5      r\R                  " SS	5      r\R                  " S
5      r\R                  " S5      r\R$                  " SS5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      rSrg) EventThreatDetectionCustomModuleiq  a  A Security Command Center resource that contains the configuration and
enablement state of a custom module, which enables Event Threat Detection to
write certain findings to Security Command Center.

Enums:
  EnablementStateValueValuesEnum: Optional. The state of enablement for the
    module at the given level of the hierarchy.

Messages:
  ConfigValue: Optional. Configuration for the module. For the resident
    module, its configuration value is defined at this level. For the
    inherited module, its configuration value is inherited from the ancestor
    module.

Fields:
  ancestorModule: Output only. The closest ancestor module that this module
    inherits the enablement state from. If empty, indicates that the custom
    module was created in the requesting parent organization, folder, or
    project. The format is the same as the custom module's resource name.
  config: Optional. Configuration for the module. For the resident module,
    its configuration value is defined at this level. For the inherited
    module, its configuration value is inherited from the ancestor module.
  description: Optional. A description of the module.
  displayName: Optional. The human-readable name of the module.
  enablementState: Optional. The state of enablement for the module at the
    given level of the hierarchy.
  lastEditor: Output only. The editor the module was last updated by.
  name: Identifier. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
  type: Optional. Type for the module. For example, `CONFIGURABLE_BAD_IP`.
  updateTime: Output only. The time the module was last updated.
c                   (    \ rS rSrSrSrSrSrSrSr	g)	?EventThreatDetectionCustomModule.EnablementStateValueValuesEnumi  a[  Optional. The state of enablement for the module at the given level of
the hierarchy.

Values:
  ENABLEMENT_STATE_UNSPECIFIED: Unspecified enablement state.
  ENABLED: The module is enabled at the given level.
  DISABLED: The module is disabled at the given level.
  INHERITED: State is inherited from an ancestor module. The module will
    either be effectively `ENABLED` or `DISABLED` based on its closest
    non-inherited ancestor module in the CRM hierarchy. If you try to set
    a top-level module (a module with no parent) to the `INHERITED` state,
    you receive an `INVALID_ARGUMENT` error.
r   r   r   r#   r   N
r   r   r   r   r   rn   ro   rp   	INHERITEDr   r   r   r   rq   r     s     $% GHIr   rq   rs   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
,EventThreatDetectionCustomModule.ConfigValuei  aY  Optional. Configuration for the module. For the resident module, its
configuration value is defined at this level. For the inherited module,
its configuration value is inherited from the ancestor module.

Messages:
  AdditionalProperty: An additional property for a ConfigValue object.

Fields:
  additionalProperties: Properties of the object.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)?EventThreatDetectionCustomModule.ConfigValue.AdditionalPropertyi  rx   r   ry   r   r   Nrz   r   r   r   r}   r     r~   r   r}   r   Tr   r   Nr   r   r   r   r   r     4    		AY.. 	A %112FTXYr   r   r   r   r#   rH   rR   rT   rU      	   r   N)r   r   r   r   r   r   r)   rq   r   r   r   r   r   ancestorModuler   r   rX   r   r+   r   
lastEditorr9   r   
updateTimer   r   r   r   r   r   q  s    #Jy~~ & !!"89ZI%% Z :Z2 ((+.!!-3&%%a(+%%a(+''(H!L/$$Q'*			q	!$			q	!$$$Q'*r   r   c                       \ rS rSrSr\R                  " S5      r\R                  " S5      r\R                  " S5      r	\R                  " S5      r
Srg)	rQ   i  aq  Represents a textual expression in the Common Expression Language (CEL)
syntax. CEL is a C-like expression language. The syntax and semantics of CEL
are documented at https://github.com/google/cel-spec. Example (Comparison):
title: "Summary size limit" description: "Determines if a summary is less
than 100 chars" expression: "document.summary.size() < 100" Example
(Equality): title: "Requestor is owner" description: "Determines if
requestor is the document owner" expression: "document.owner ==
request.auth.claims.email" Example (Logic): title: "Public documents"
description: "Determine whether the document should be publicly visible"
expression: "document.type != 'private' && document.type != 'internal'"
Example (Data Manipulation): title: "Notification string" description:
"Create a notification string with a timestamp." expression: "'New message
received at ' + string(document.create_time)" The exact variables and
functions that may be referenced within an expression are determined by the
service that evaluates it. See the service documentation for additional
information.

Fields:
  description: Optional. Description of the expression. This is a longer
    text which describes the expression, e.g. when hovered over it in a UI.
  expression: Textual representation of an expression in Common Expression
    Language syntax.
  location: Optional. String indicating the location of the expression for
    error reporting, e.g. a file name and a position in the file.
  title: Optional. Title for the expression, i.e. a short string describing
    its purpose. This can be used e.g. in UIs which allow to enter the
    expression.
r   r   r#   rH   r   N)r   r   r   r   r   r   r   rX   
expressionlocationtitler   r   r   r   rQ   rQ     sI    : %%a(+$$Q'*""1%(



"%r   rQ   c                   x   \ rS rSrSr\R                  " S5       " S S\R                  5      5       r	\R                  " S5       " S S\R                  5      5       r
\R                  " S5      r\R                  " SS	5      r\R                  " S
5      r\R                  " SS5      r\R                  " S5      rSrg)GoogleCloudLocationLocationi  aM  A resource that represents a Google Cloud location.

Messages:
  LabelsValue: Cross-service attributes for the location. For example
    {"cloud.googleapis.com/region": "us-east1"}
  MetadataValue: Service-specific metadata. For example the available
    capacity at the given location.

Fields:
  displayName: The friendly name for this location, typically a nearby city
    name. For example, "Tokyo".
  labels: Cross-service attributes for the location. For example
    {"cloud.googleapis.com/region": "us-east1"}
  locationId: The canonical id for this location. For example: `"us-east1"`.
  metadata: Service-specific metadata. For example the available capacity at
    the given location.
  name: Resource name for the location, which may vary between
    implementations. For example: `"projects/example-project/locations/us-
    east1"`
rs   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
'GoogleCloudLocationLocation.LabelsValuei	  a   Cross-service attributes for the location. For example
{"cloud.googleapis.com/region": "us-east1"}

Messages:
  AdditionalProperty: An additional property for a LabelsValue object.

Fields:
  additionalProperties: Additional properties of type LabelsValue
c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      rSr	g):GoogleCloudLocationLocation.LabelsValue.AdditionalPropertyi  zAn additional property for a LabelsValue object.

Fields:
  key: Name of the additional property.
  value: A string attribute.
r   r   r   N)
r   r   r   r   r   r   r   r{   r|   r   r   r   r   r}   r     s)    
 !!!$c##A&er   r}   r   Tr   r   Nr   r   r   r   LabelsValuer   	  s2    	'Y.. 	' %112FTXYr   r   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
)GoogleCloudLocationLocation.MetadataValuei"  a  Service-specific metadata. For example the available capacity at the
given location.

Messages:
  AdditionalProperty: An additional property for a MetadataValue object.

Fields:
  additionalProperties: Properties of the object. Contains field @type
    with type URL.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)<GoogleCloudLocationLocation.MetadataValue.AdditionalPropertyi/  An additional property for a MetadataValue object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   ry   r   r   Nrz   r   r   r   r}   r   /  r~   r   r}   r   Tr   r   Nr   r   r   r   MetadataValuer   "  r   r   r   r   r   r#   rH   rR   r   N)r   r   r   r   r   r   r   r   r   r   r   r   r   r   labels
locationIdmetadatar9   r   r   r   r   r   r     s    * !!"89ZI%% Z :Z0 !!"89Zi'' Z :Z2 %%a(+!!-3&$$Q'*##OQ7(			q	!$r   r   c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " S5      r
S	rg
)GoogleIamV1BindingiC  at  Associates `members`, or principals, with a `role`.

Fields:
  condition: The condition that is associated with this binding. If the
    condition evaluates to `true`, then this binding applies to the current
    request. If the condition evaluates to `false`, then this binding does
    not apply to the current request. However, a different role binding
    might grant the same role to one or more of the principals in this
    binding. To learn which resources support conditions in their IAM
    policies, see the [IAM
    documentation](https://cloud.google.com/iam/help/conditions/resource-
    policies).
  members: Specifies the principals requesting access for a Google Cloud
    resource. `members` can have the following values: * `allUsers`: A
    special identifier that represents anyone who is on the internet; with
    or without a Google account. * `allAuthenticatedUsers`: A special
    identifier that represents anyone who is authenticated with a Google
    account or a service account. Does not include identities that come from
    external identity providers (IdPs) through identity federation. *
    `user:{emailid}`: An email address that represents a specific Google
    account. For example, `alice@example.com` . *
    `serviceAccount:{emailid}`: An email address that represents a Google
    service account. For example, `my-other-
    app@appspot.gserviceaccount.com`. *
    `serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]`:
    An identifier for a [Kubernetes service
    account](https://cloud.google.com/kubernetes-engine/docs/how-
    to/kubernetes-service-accounts). For example, `my-
    project.svc.id.goog[my-namespace/my-kubernetes-sa]`. *
    `group:{emailid}`: An email address that represents a Google group. For
    example, `admins@example.com`. * `domain:{domain}`: The G Suite domain
    (primary) that represents all the users of that domain. For example,
    `google.com` or `example.com`. * `principal://iam.googleapis.com/locatio
    ns/global/workforcePools/{pool_id}/subject/{subject_attribute_value}`: A
    single identity in a workforce identity pool. * `principalSet://iam.goog
    leapis.com/locations/global/workforcePools/{pool_id}/group/{group_id}`:
    All workforce identities in a group. * `principalSet://iam.googleapis.co
    m/locations/global/workforcePools/{pool_id}/attribute.{attribute_name}/{
    attribute_value}`: All workforce identities with a specific attribute
    value. * `principalSet://iam.googleapis.com/locations/global/workforcePo
    ols/{pool_id}/*`: All identities in a workforce identity pool. * `princi
    pal://iam.googleapis.com/projects/{project_number}/locations/global/work
    loadIdentityPools/{pool_id}/subject/{subject_attribute_value}`: A single
    identity in a workload identity pool. * `principalSet://iam.googleapis.c
    om/projects/{project_number}/locations/global/workloadIdentityPools/{poo
    l_id}/group/{group_id}`: A workload identity pool group. * `principalSet
    ://iam.googleapis.com/projects/{project_number}/locations/global/workloa
    dIdentityPools/{pool_id}/attribute.{attribute_name}/{attribute_value}`:
    All identities in a workload identity pool with a certain attribute. * `
    principalSet://iam.googleapis.com/projects/{project_number}/locations/gl
    obal/workloadIdentityPools/{pool_id}/*`: All identities in a workload
    identity pool. * `deleted:user:{emailid}?uid={uniqueid}`: An email
    address (plus unique identifier) representing a user that has been
    recently deleted. For example,
    `alice@example.com?uid=123456789012345678901`. If the user is recovered,
    this value reverts to `user:{emailid}` and the recovered user retains
    the role in the binding. *
    `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address
    (plus unique identifier) representing a service account that has been
    recently deleted. For example, `my-other-
    app@appspot.gserviceaccount.com?uid=123456789012345678901`. If the
    service account is undeleted, this value reverts to
    `serviceAccount:{emailid}` and the undeleted service account retains the
    role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An
    email address (plus unique identifier) representing a Google group that
    has been recently deleted. For example,
    `admins@example.com?uid=123456789012345678901`. If the group is
    recovered, this value reverts to `group:{emailid}` and the recovered
    group retains the role in the binding. * `deleted:principal://iam.google
    apis.com/locations/global/workforcePools/{pool_id}/subject/{subject_attr
    ibute_value}`: Deleted single identity in a workforce identity pool. For
    example, `deleted:principal://iam.googleapis.com/locations/global/workfo
    rcePools/my-pool-id/subject/my-subject-attribute-value`.
  role: Role that is assigned to the list of `members`, or principals. For
    example, `roles/viewer`, `roles/editor`, or `roles/owner`. For an
    overview of the IAM roles and permissions, see the [IAM
    documentation](https://cloud.google.com/iam/docs/roles-overview). For a
    list of the available pre-defined roles, see
    [here](https://cloud.google.com/iam/docs/understanding-roles).
rQ   r   r   Tr   r#   r   N)r   r   r   r   r   r   r   	conditionr   membersroler   r   r   r   r   r   C  s?    Ob $$VQ/)!!!d3'			q	!$r   r   c                   `    \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	Sr
g	)
7ListDescendantEventThreatDetectionCustomModulesResponsei  a  Response message for
SecurityCenterManagement.ListDescendantEventThreatDetectionCustomModules.

Fields:
  eventThreatDetectionCustomModules: The list of custom modules.
  nextPageToken: A pagination token. To retrieve the next page of results,
    call the method again with this token.
r   r   Tr   r   r   Nr   r   r   r   r   r   r   !eventThreatDetectionCustomModulesr   nextPageTokenr   r   r   r   r   r     1     '0&<&<=_abmq&r#''*-r   r   c                   `    \ rS rSrSr\R                  " S5      r\R                  " SSSS9r	Sr
g	)
:ListDescendantSecurityHealthAnalyticsCustomModulesResponsei  a>  Response message for
SecurityCenterManagement.ListDescendantSecurityHealthAnalyticsCustomModules.

Fields:
  nextPageToken: A pagination token. To retrieve the next page of results,
    call the method again with this token.
  securityHealthAnalyticsCustomModules: The list of
    SecurityHealthAnalyticsCustomModules
r   #SecurityHealthAnalyticsCustomModuler   Tr   r   Nr   r   r   r   r   r   r   r   r   $securityHealthAnalyticsCustomModulesr   r   r   r   r   r     1     ''*-)2)?)?@eghsw)x&r   r   c                   `    \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	Sr
g	)
6ListEffectiveEventThreatDetectionCustomModulesResponsei  aL  Response message for
SecurityCenterManagement.ListEffectiveEventThreatDetectionCustomModules.

Fields:
  effectiveEventThreatDetectionCustomModules: The list of effective Event
    Threat Detection custom modules.
  nextPageToken: A pagination token. To retrieve the next page of results,
    call the method again with this token.
ri   r   Tr   r   r   N)r   r   r   r   r   r   r   *effectiveEventThreatDetectionCustomModulesr   r   r   r   r   r   r   r     s8     09/E/EFqst  @D  0E,''*-r   r   c                   `    \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	Sr
g	)
9ListEffectiveSecurityHealthAnalyticsCustomModulesResponsei  aU  Response message for
SecurityCenterManagement.ListEffectiveSecurityHealthAnalyticsCustomModules.

Fields:
  effectiveSecurityHealthAnalyticsCustomModules: The list of effective
    Security Health Analytics custom modules.
  nextPageToken: A pagination token. To retrieve the next page of results,
    call the method again with this token.
r   r   Tr   r   r   N)r   r   r   r   r   r   r   -effectiveSecurityHealthAnalyticsCustomModulesr   r   r   r   r   r   r   r     s8     3<2H2HIwyz  FJ  3K/''*-r   r   c                   `    \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	Sr
g	)
-ListEventThreatDetectionCustomModulesResponsei  a  Response message for
SecurityCenterManagement.ListEventThreatDetectionCustomModules.

Fields:
  eventThreatDetectionCustomModules: The list of custom modules.
  nextPageToken: A pagination token. To retrieve the next page of results,
    call the method again with this token.
r   r   Tr   r   r   Nr   r   r   r   r   r     r   r   r   c                   `    \ rS rSrSr\R                  " SSSS9r\R                  " S5      r	Sr
g	)
ListLocationsResponsei  zThe response message for Locations.ListLocations.

Fields:
  locations: A list of locations that matches the specified filter in the
    request.
  nextPageToken: The standard List next-page token.
r   r   Tr   r   r   N)r   r   r   r   r   r   r   	locationsr   r   r   r   r   r   r   r     s/     $$%BAPTU)''*-r   r   c                       \ rS rSrSr\R                  " S5      r\R                  " SSSS9r	\R                  " SSS9r
S	rg
)ListOperationsResponsei  a  The response message for Operations.ListOperations.

Fields:
  nextPageToken: The standard List next-page token.
  operations: A list of operations that matches the specified filter in the
    request.
  unreachable: Unordered list. Unreachable resources. Populated when the
    request sets `ListOperationsRequest.return_partial_success` and reads
    across collections e.g. when attempting to list all resources across all
    supported locations.
r   	Operationr   Tr   r#   r   N)r   r   r   r   r   r   r   r   r   
operationsunreachabler   r   r   r   r   r     s?    
 ''*-%%k1tD*%%a$7+r   r   c                   `    \ rS rSrSr\R                  " S5      r\R                  " SSSS9r	Sr
g	)
"ListSecurityCenterServicesResponsei  zResponse message for
SecurityCenterManagement.ListSecurityCenterServices.

Fields:
  nextPageToken: A pagination token. To retrieve the next page of results,
    call the method again with this token.
  securityCenterServices: The list of services.
r   SecurityCenterServicer   Tr   r   N)r   r   r   r   r   r   r   r   r   securityCenterServicesr   r   r   r   r   r     s0     ''*-$112I1W[\r   r   c                   `    \ rS rSrSr\R                  " S5      r\R                  " SSSS9r	Sr
g	)
0ListSecurityHealthAnalyticsCustomModulesResponsei  a9  Response message for
SecurityCenterManagement.ListSecurityHealthAnalyticsCustomModules.

Fields:
  nextPageToken: A pagination token. To retrieve the next page of results,
    call the method again with this token.
  securityHealthAnalyticsCustomModules: The list of Security Health
    Analytics custom modules.
r   r   r   Tr   r   Nr   r   r   r   r   r     r   r   r   c                       \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " SS5      rS	rg
)ModuleSettingsi  a@  The settings for individual modules.

Enums:
  EffectiveEnablementStateValueValuesEnum: Output only. The effective
    enablement state for the module at its level of the resource hierarchy.
    If the intended state is set to `INHERITED`, the effective state will be
    inherited from the enablement state of an ancestor. This state may
    differ from the intended enablement state due to billing eligibility or
    onboarding status.
  IntendedEnablementStateValueValuesEnum: Optional. The intended enablement
    state for the module at its level of the resource hierarchy.

Fields:
  effectiveEnablementState: Output only. The effective enablement state for
    the module at its level of the resource hierarchy. If the intended state
    is set to `INHERITED`, the effective state will be inherited from the
    enablement state of an ancestor. This state may differ from the intended
    enablement state due to billing eligibility or onboarding status.
  intendedEnablementState: Optional. The intended enablement state for the
    module at its level of the resource hierarchy.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
6ModuleSettings.EffectiveEnablementStateValueValuesEnumi6  aQ  Output only. The effective enablement state for the module at its
level of the resource hierarchy. If the intended state is set to
`INHERITED`, the effective state will be inherited from the enablement
state of an ancestor. This state may differ from the intended enablement
state due to billing eligibility or onboarding status.

Values:
  ENABLEMENT_STATE_UNSPECIFIED: Default value. This value is unused.
  INHERITED: State is inherited from the parent resource. Valid as an
    intended enablement state, but not as an effective enablement state.
  ENABLED: State is enabled.
  DISABLED: State is disabled.
  INGEST_ONLY: Security Command Center is configured to ingest findings
    from this service, but not to enable this service. This state
    indicates that Security Command Center is misconfigured. You can't set
    this state yourself.
r   r   r   r#   rH   r   Nr   r   r   r   r   rn   r   ro   rp   INGEST_ONLYr   r   r   r   'EffectiveEnablementStateValueValuesEnumr   6  #    " $% IGHKr   r   c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
5ModuleSettings.IntendedEnablementStateValueValuesEnumiN  af  Optional. The intended enablement state for the module at its level of
the resource hierarchy.

Values:
  ENABLEMENT_STATE_UNSPECIFIED: Default value. This value is unused.
  INHERITED: State is inherited from the parent resource. Valid as an
    intended enablement state, but not as an effective enablement state.
  ENABLED: State is enabled.
  DISABLED: State is disabled.
  INGEST_ONLY: Security Command Center is configured to ingest findings
    from this service, but not to enable this service. This state
    indicates that Security Command Center is misconfigured. You can't set
    this state yourself.
r   r   r   r#   rH   r   Nr   r   r   r   &IntendedEnablementStateValueValuesEnumr   N  s#     $% IGHKr   r   r   r   r   N)r   r   r   r   r   r   r)   r   r   r+   effectiveEnablementStateintendedEnablementStater   r   r   r   r   r     sS    ,	 0y~~ * '001Z\]^%//0XZ[\r   r   c                   z   \ rS rSrSr\R                  " S5       " S S\R                  5      5       r	\R                  " S5       " S S\R                  5      5       r
\R                  " S5      r\R                  " S	S
5      r\R                  " SS5      r\R                   " S5      r\R                  " SS5      rSrg)r   ig  a  This resource represents a long-running operation that is the result of
a network API call.

Messages:
  MetadataValue: Service-specific metadata associated with the operation. It
    typically contains progress information and common metadata such as
    create time. Some services might not provide such metadata. Any method
    that returns a long-running operation should document the metadata type,
    if any.
  ResponseValue: The normal, successful response of the operation. If the
    original method returns no data on success, such as `Delete`, the
    response is `google.protobuf.Empty`. If the original method is standard
    `Get`/`Create`/`Update`, the response should be the resource. For other
    methods, the response should have the type `XxxResponse`, where `Xxx` is
    the original method name. For example, if the original method name is
    `TakeSnapshot()`, the inferred response type is `TakeSnapshotResponse`.

Fields:
  done: If the value is `false`, it means the operation is still in
    progress. If `true`, the operation is completed, and either `error` or
    `response` is available.
  error: The error result of the operation in case of failure or
    cancellation.
  metadata: Service-specific metadata associated with the operation. It
    typically contains progress information and common metadata such as
    create time. Some services might not provide such metadata. Any method
    that returns a long-running operation should document the metadata type,
    if any.
  name: The server-assigned name, which is only unique within the same
    service that originally returns it. If you use the default HTTP mapping,
    the `name` should be a resource name ending with
    `operations/{unique_id}`.
  response: The normal, successful response of the operation. If the
    original method returns no data on success, such as `Delete`, the
    response is `google.protobuf.Empty`. If the original method is standard
    `Get`/`Create`/`Update`, the response should be the resource. For other
    methods, the response should have the type `XxxResponse`, where `Xxx` is
    the original method name. For example, if the original method name is
    `TakeSnapshot()`, the inferred response type is `TakeSnapshotResponse`.
rs   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
Operation.MetadataValuei  a  Service-specific metadata associated with the operation. It typically
contains progress information and common metadata such as create time.
Some services might not provide such metadata. Any method that returns a
long-running operation should document the metadata type, if any.

Messages:
  AdditionalProperty: An additional property for a MetadataValue object.

Fields:
  additionalProperties: Properties of the object. Contains field @type
    with type URL.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)*Operation.MetadataValue.AdditionalPropertyi  r   r   ry   r   r   Nrz   r   r   r   r}   r     r~   r   r}   r   Tr   r   Nr   r   r   r   r   r     s4    	AY.. 	A %112FTXYr   r   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
Operation.ResponseValuei  a  The normal, successful response of the operation. If the original
method returns no data on success, such as `Delete`, the response is
`google.protobuf.Empty`. If the original method is standard
`Get`/`Create`/`Update`, the response should be the resource. For other
methods, the response should have the type `XxxResponse`, where `Xxx` is
the original method name. For example, if the original method name is
`TakeSnapshot()`, the inferred response type is `TakeSnapshotResponse`.

Messages:
  AdditionalProperty: An additional property for a ResponseValue object.

Fields:
  additionalProperties: Properties of the object. Contains field @type
    with type URL.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)*Operation.ResponseValue.AdditionalPropertyi  zAn additional property for a ResponseValue object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   ry   r   r   Nrz   r   r   r   r}   r     r~   r   r}   r   Tr   r   Nr   r   r   r   ResponseValuer     s4     	AY.. 	A %112FTXYr   r   r   Statusr   r#   rH   rR   r   N)r   r   r   r   r   r   r   r   r   r   r   BooleanFielddoner   errorr   r   r9   responser   r   r   r   r   r   g  s    'R !!"89Zi'' Z :Z6 !!"89Zi'' Z :Z< 
			"$

 
 1
-%##OQ7(			q	!$##OQ7(r   r   c                       \ rS rSrSr\R                  " SSSS9r\R                  " SSSS9r\R                  " S	5      r
\R                  " S
\R                  R                  S9rSrg)Policyi  aw  An Identity and Access Management (IAM) policy, which specifies access
controls for Google Cloud resources. A `Policy` is a collection of
`bindings`. A `binding` binds one or more `members`, or principals, to a
single `role`. Principals can be user accounts, service accounts, Google
groups, and domains (such as G Suite). A `role` is a named list of
permissions; each `role` can be an IAM predefined role or a user-created
custom role. For some types of Google Cloud resources, a `binding` can also
specify a `condition`, which is a logical expression that allows access to a
resource only if the expression evaluates to `true`. A condition can add
constraints based on attributes of the request, the resource, or both. To
learn which resources support conditions in their IAM policies, see the [IAM
documentation](https://cloud.google.com/iam/help/conditions/resource-
policies). **JSON example:** ``` { "bindings": [ { "role":
"roles/resourcemanager.organizationAdmin", "members": [
"user:mike@example.com", "group:admins@example.com", "domain:google.com",
"serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role":
"roles/resourcemanager.organizationViewer", "members": [
"user:eve@example.com" ], "condition": { "title": "expirable access",
"description": "Does not grant access after Sep 2020", "expression":
"request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag":
"BwWWja0YfJA=", "version": 3 } ``` **YAML example:** ``` bindings: -
members: - user:mike@example.com - group:admins@example.com -
domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
role: roles/resourcemanager.organizationAdmin - members: -
user:eve@example.com role: roles/resourcemanager.organizationViewer
condition: title: expirable access description: Does not grant access after
Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z')
etag: BwWWja0YfJA= version: 3 ``` For a description of IAM and its features,
see the [IAM documentation](https://cloud.google.com/iam/docs/).

Fields:
  auditConfigs: Specifies cloud audit logging configuration for this policy.
  bindings: Associates a list of `members`, or principals, with a `role`.
    Optionally, may specify a `condition` that determines how and when the
    `bindings` are applied. Each of the `bindings` must contain at least one
    principal. The `bindings` in a `Policy` can refer to up to 1,500
    principals; up to 250 of these principals can be Google groups. Each
    occurrence of a principal counts towards these limits. For example, if
    the `bindings` grant 50 different roles to `user:alice@example.com`, and
    not to any other principal, then you can add another 1,450 principals to
    the `bindings` in the `Policy`.
  etag: `etag` is used for optimistic concurrency control as a way to help
    prevent simultaneous updates of a policy from overwriting each other. It
    is strongly suggested that systems make use of the `etag` in the read-
    modify-write cycle to perform policy updates in order to avoid race
    conditions: An `etag` is returned in the response to `getIamPolicy`, and
    systems are expected to put that etag in the request to `setIamPolicy`
    to ensure that their change will be applied to the same version of the
    policy. **Important:** If you use IAM Conditions, you must include the
    `etag` field whenever you call `setIamPolicy`. If you omit this field,
    then IAM allows you to overwrite a version `3` policy with a version `1`
    policy, and all of the conditions in the version `3` policy are lost.
  version: Specifies the format of the policy. Valid values are `0`, `1`,
    and `3`. Requests that specify an invalid value are rejected. Any
    operation that affects conditional role bindings must specify version
    `3`. This requirement applies to the following operations: * Getting a
    policy that includes a conditional role binding * Adding a conditional
    role binding to a policy * Changing a conditional role binding in a
    policy * Removing any role binding, with or without a condition, from a
    policy that includes conditions **Important:** If you use IAM
    Conditions, you must include the `etag` field whenever you call
    `setIamPolicy`. If you omit this field, then IAM allows you to overwrite
    a version `3` policy with a version `1` policy, and all of the
    conditions in the version `3` policy are lost. If a policy does not
    include any conditions, operations on that policy may specify any valid
    version or leave the field unset. To learn which resources support
    conditions in their IAM policies, see the [IAM
    documentation](https://cloud.google.com/iam/help/conditions/resource-
    policies).
r	   r   Tr   r   r   r#   rH   variantr   N)r   r   r   r   r   r   r   auditConfigsbindings
BytesFieldetagIntegerFieldVariantINT32versionr   r   r   r   r   r     sb    EN ''q4H,##$8!dK(			a	 $""1i.?.?.E.EF'r   r   c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S\R                  R                  S9r
Srg)r`   i!  zA position in the uploaded text version of a module.

Fields:
  columnNumber: The column position in the line.
  lineNumber: The line position in the text.
r   r   r   r   N)r   r   r   r   r   r   r   r   r   columnNumber
lineNumberr   r   r   r   r`   r`   !  sE     ''93D3D3J3JK,%%a1B1B1H1HI*r   r`   c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)rf   i-  aR  An individual name-value pair that defines a custom source property.

Fields:
  name: Optional. Name of the property for the custom output.
  valueExpression: Optional. The CEL expression for the custom output. A
    resource property can be specified to return the value of the property
    or a text string enclosed in quotation marks.
r   rQ   r   r   N)r   r   r   r   r   r   r   r9   r   valueExpressionr   r   r   r   rf   rf   -  s+     
		q	!$**615/r   rf   c                   :    \ rS rSrSr\R                  " SSS9rSrg)rS   i;  zuResource for selecting resource type.

Fields:
  resourceTypes: Optional. The resource types to run the detector on.
r   Tr   r   N)	r   r   r   r   r   r   r   resourceTypesr   r   r   r   rS   rS   ;  s     ''D9-r   rS   c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\	R                  " S5       " S S	\R                  5      5       r\	R                  " S5       " S
 S\R                  5      5       r\R                  " SS5      r\R                  " SS5      r\R"                  " S	S5      r\R&                  " S5      r\R"                  " SS5      r\R&                  " S5      rSrg)r   iE  a  Represents a particular Security Command Center service. This includes
settings information such as top-level enablement in addition to individual
module settings. Service settings can be configured at the organization,
folder, or project level. Service settings at the organization or folder
level are inherited by those in descendant folders and projects.

Enums:
  EffectiveEnablementStateValueValuesEnum: Output only. The effective
    enablement state for the service at its level of the resource hierarchy.
    If the intended state is set to `INHERITED`, the effective state will be
    inherited from the enablement state of an ancestor. This state may
    differ from the intended enablement state due to billing eligibility or
    onboarding status.
  IntendedEnablementStateValueValuesEnum: Optional. The intended enablement
    state for the service at its level of the resource hierarchy. A
    `DISABLED` state will override all module enablement states to
    `DISABLED`.

Messages:
  ModulesValue: Optional. The module configurations, including the
    enablement state for the service's modules. The absence of a module in
    the map implies that its configuration is inherited from its parents.
  ServiceConfigValue: Optional. Additional service-specific configuration.
    Not all services will utilize this field.

Fields:
  effectiveEnablementState: Output only. The effective enablement state for
    the service at its level of the resource hierarchy. If the intended
    state is set to `INHERITED`, the effective state will be inherited from
    the enablement state of an ancestor. This state may differ from the
    intended enablement state due to billing eligibility or onboarding
    status.
  intendedEnablementState: Optional. The intended enablement state for the
    service at its level of the resource hierarchy. A `DISABLED` state will
    override all module enablement states to `DISABLED`.
  modules: Optional. The module configurations, including the enablement
    state for the service's modules. The absence of a module in the map
    implies that its configuration is inherited from its parents.
  name: Identifier. The name of the service, in one of the following
    formats: * `organizations/{organization}/locations/{location}/securityCe
    nterServices/{service}` *
    `folders/{folder}/locations/{location}/securityCenterServices/{service}`
    * `projects/{project}/locations/{location}/securityCenterServices/{servi
    ce}` The following values are valid for `{service}`: * `container-
    threat-detection` * `event-threat-detection` * `security-health-
    analytics` * `vm-threat-detection` * `web-security-scanner` * `vm-
    threat-detection-aws` * `cloud-run-threat-detection` * `vm-manager` *
    `ec2-vulnerability-assessment` * `gce-vulnerability-assessment` *
    `azure-vulnerability-assessment` * `notebook-security-scanner` *
    `artifact-analysis`
  serviceConfig: Optional. Additional service-specific configuration. Not
    all services will utilize this field.
  updateTime: Output only. The time the service was last updated. This could
    be due to an explicit user update or due to a side effect of another
    system change, such as billing subscription expiry.
c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
=SecurityCenterService.EffectiveEnablementStateValueValuesEnumi  aR  Output only. The effective enablement state for the service at its
level of the resource hierarchy. If the intended state is set to
`INHERITED`, the effective state will be inherited from the enablement
state of an ancestor. This state may differ from the intended enablement
state due to billing eligibility or onboarding status.

Values:
  ENABLEMENT_STATE_UNSPECIFIED: Default value. This value is unused.
  INHERITED: State is inherited from the parent resource. Valid as an
    intended enablement state, but not as an effective enablement state.
  ENABLED: State is enabled.
  DISABLED: State is disabled.
  INGEST_ONLY: Security Command Center is configured to ingest findings
    from this service, but not to enable this service. This state
    indicates that Security Command Center is misconfigured. You can't set
    this state yourself.
r   r   r   r#   rH   r   Nr   r   r   r   r   r
    r   r   r   c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
<SecurityCenterService.IntendedEnablementStateValueValuesEnumi  a  Optional. The intended enablement state for the service at its level
of the resource hierarchy. A `DISABLED` state will override all module
enablement states to `DISABLED`.

Values:
  ENABLEMENT_STATE_UNSPECIFIED: Default value. This value is unused.
  INHERITED: State is inherited from the parent resource. Valid as an
    intended enablement state, but not as an effective enablement state.
  ENABLED: State is enabled.
  DISABLED: State is disabled.
  INGEST_ONLY: Security Command Center is configured to ingest findings
    from this service, but not to enable this service. This state
    indicates that Security Command Center is misconfigured. You can't set
    this state yourself.
r   r   r   r#   rH   r   Nr   r   r   r   r   r    s#     $% IGHKr   r   rs   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
"SecurityCenterService.ModulesValuei  a_  Optional. The module configurations, including the enablement state
for the service's modules. The absence of a module in the map implies that
its configuration is inherited from its parents.

Messages:
  AdditionalProperty: An additional property for a ModulesValue object.

Fields:
  additionalProperties: Additional properties of type ModulesValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)5SecurityCenterService.ModulesValue.AdditionalPropertyi  zAn additional property for a ModulesValue object.

Fields:
  key: Name of the additional property.
  value: A ModuleSettings attribute.
r   r   r   r   Nrz   r   r   r   r}   r    s,    
 !!!$c$$%5q9er   r}   r   Tr   r   Nr   r   r   r   ModulesValuer    s2    		:Y.. 	: %112FTXYr   r  c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
(SecurityCenterService.ServiceConfigValuei  zOptional. Additional service-specific configuration. Not all services
will utilize this field.

Messages:
  AdditionalProperty: An additional property for a ServiceConfigValue
    object.

Fields:
  additionalProperties: Properties of the object.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g);SecurityCenterService.ServiceConfigValue.AdditionalPropertyi  zAn additional property for a ServiceConfigValue object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   ry   r   r   Nrz   r   r   r   r}   r    r~   r   r}   r   Tr   r   Nr   r   r   r   ServiceConfigValuer    r   r   r  r   r   r#   rH   rR   rT   r   N)r   r   r   r   r   r   r)   r   r   r   r   r   r  r  r+   r   r   r   modulesr   r9   serviceConfigr   r   r   r   r   r   r   E  s    7r	 0y~~ , !!"89ZY&& Z :Z2 !!"89Z9,, Z :Z2 '001Z\]^%//0XZ[\"">15'			q	!$(()=qA-$$Q'*r   r   c                   B   \ rS rSrSr " S S\R                  5      r\R                  " S5      r	\R                  " SS5      r\R                  " S5      r\R                  " SS	5      r\R                  " S
5      r\R                  " S5      r\R                  " S5      rSrg)r   i  a  Represents an instance of a Security Health Analytics custom module,
including its full module name, display name, enablement state, and last
updated time. You can create a custom module at the organization, folder, or
project level. Custom modules that you create at the organization or folder
level are inherited by the descendant folders and projects.

Enums:
  EnablementStateValueValuesEnum: Optional. The enablement state of the
    custom module.

Fields:
  ancestorModule: Output only. Specifies the organization or folder from
    which the custom module is inherited. If empty, indicates that the
    custom module was created in the organization, folder, or project in
    which you are viewing the custom module.
  customConfig: Optional. The user-specified custom configuration for the
    module.
  displayName: Optional. The display name of the Security Health Analytics
    custom module. This display name becomes the finding category for all
    findings that are returned by this custom module. The display name must
    be between 1 and 128 characters, start with a lowercase letter, and
    contain alphanumeric characters or underscores only.
  enablementState: Optional. The enablement state of the custom module.
  lastEditor: Output only. The editor that last updated the custom module.
  name: Identifier. The full resource name of the custom module, in one of
    the following formats: * `organizations/{organization}/locations/{locati
    on}/securityHealthAnalyticsCustomModules/{custom_module}` * `folders/{fo
    lder}/locations/{location}/securityHealthAnalyticsCustomModules/{custom_
    module}` * `projects/{project}/locations/{location}/securityHealthAnalyt
    icsCustomModules/{custom_module}`
  updateTime: Output only. The time at which the custom module was last
    updated.
c                   (    \ rS rSrSrSrSrSrSrSr	g)	BSecurityHealthAnalyticsCustomModule.EnablementStateValueValuesEnumi  a  Optional. The enablement state of the custom module.

Values:
  ENABLEMENT_STATE_UNSPECIFIED: Default value. This value is unused.
  ENABLED: The module is enabled at the given organization, folder, or
    project.
  DISABLED: The module is disabled at the given organization, folder, or
    project.
  INHERITED: State is inherited from an ancestor module. The module will
    either be effectively `ENABLED` or `DISABLED` based on its closest
    non-inherited ancestor module in the resource hierarchy. If you try to
    set a top-level module (a module with no parent) to the `INHERITED`
    state, you receive an `INVALID_ARGUMENT` error.
r   r   r   r#   r   Nr   r   r   r   rq   r    s     $% GHIr   rq   r   rC   r   r#   rH   rR   rT   rU   r   N)r   r   r   r   r   r   r)   rq   r   r   r   r   r   r+   r   r   r9   r   r   r   r   r   r   r     s     Dy~~ ( ((+.'':,%%a(+''(H!L/$$Q'*			q	!$$$Q'*r   r   c                   :    \ rS rSrSr\R                  " SSS9rSrg)\SecuritycentermanagementFoldersLocationsEffectiveEventThreatDetectionCustomModulesGetRequesti)  a8  A SecuritycentermanagementFoldersLocationsEffectiveEventThreatDetectionC
ustomModulesGetRequest object.

Fields:
  name: Required. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/effectiveEventThreatDetectionCustomModules/{custom
    _module}` * `folders/{folder}/locations/{location}/effectiveEventThreatD
    etectionCustomModules/{custom_module}` * `projects/{project}/locations/{
    location}/effectiveEventThreatDetectionCustomModules/{custom_module}`
r   Trequiredr   N	r   r   r   r   r   r   r   r9   r   r   r   r   r  r  )      
 
		q4	0$r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)]SecuritycentermanagementFoldersLocationsEffectiveEventThreatDetectionCustomModulesListRequesti9  a  A SecuritycentermanagementFoldersLocationsEffectiveEventThreatDetectionC
ustomModulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list effective custom modules, in one
    of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr   r   r   r   r   r   r   r   r   pageSizer   	pageTokenparentr   r   r   r   r#  r#  9  I    " ##Ay/@/@/F/FG(##A&)  T2&r   r#  c                   :    \ rS rSrSr\R                  " SSS9rSrg)_SecuritycentermanagementFoldersLocationsEffectiveSecurityHealthAnalyticsCustomModulesGetRequestiP  a  A SecuritycentermanagementFoldersLocationsEffectiveSecurityHealthAnalyti
csCustomModulesGetRequest object.

Fields:
  name: Required. The full resource name of the custom module, specified in
    one of the following formats: * `organizations/organization/{location}/e
    ffectiveSecurityHealthAnalyticsCustomModules/{custom_module}` * `folders
    /folder/{location}/effectiveSecurityHealthAnalyticsCustomModules/{custom
    _module}` * `projects/project/{location}/effectiveSecurityHealthAnalytic
    sCustomModules/{custom_module}`
r   Tr  r   Nr   r   r   r   r*  r*  P  r!  r   r*  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)`SecuritycentermanagementFoldersLocationsEffectiveSecurityHealthAnalyticsCustomModulesListRequesti`  a  A SecuritycentermanagementFoldersLocationsEffectiveSecurityHealthAnalyti
csCustomModulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list effective custom modules, in one
    of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r,  r,  `  r(  r   r,  c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " S5      rS	rg
)VSecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModulesCreateRequestiw  a  A SecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModu
lesCreateRequest object.

Fields:
  eventThreatDetectionCustomModule: A EventThreatDetectionCustomModule
    resource to be passed as the request body.
  parent: Required. Name of parent for the module, in one of the following
    formats: * `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be created. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to create the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   r   r   Tr  r#   r   Nr   r   r   r   r   r   r    eventThreatDetectionCustomModuler   r'  r   validateOnlyr   r   r   r   r.  r.  w  @    ( &/%;%;<^`a%b"  T2&''*,r   r.  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	VSecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModulesDeleteRequesti  aD  A SecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModu
lesDeleteRequest object.

Fields:
  name: Required. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be deleted. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to delete the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   Tr  r   r   Nr   r   r   r   r   r   r   r9   r   r1  r   r   r   r   r4  r4    +    ( 
		q4	0$''*,r   r4  c                   :    \ rS rSrSr\R                  " SSS9rSrg)SSecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModulesGetRequesti  a  A SecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModu
lesGetRequest object.

Fields:
  name: Required. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
r   Tr  r   Nr   r   r   r   r8  r8    r!  r   r8  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)^SecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModulesListDescendantRequesti  aK  A SecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModu
lesListDescendantRequest object.

Fields:
  pageSize: Optional. The maximum number of modules to return. The service
    may return fewer than this value. If unspecified, at most 10 configs
    will be returned. The maximum value is 1000; values above 1000 will be
    coerced to 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list custom modules, in one of the
    following formats: * `organizations/{organization}/locations/{location}`
    * `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r:  r:    I    $ ##Ay/@/@/F/FG(##A&)  T2&r   r:  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)TSecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModulesListRequesti  aA  A SecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModu
lesListRequest object.

Fields:
  pageSize: Optional. The maximum number of modules to return. The service
    may return fewer than this value. If unspecified, at most 10 modules
    will be returned. The maximum value is 1000; values above 1000 will be
    coerced to 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list custom modules, in one of the
    following formats: * `organizations/{organization}/locations/{location}`
    * `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r=  r=    r;  r   r=  c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " S5      r
\R                  " S	5      rS
rg)USecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModulesPatchRequesti  a  A SecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModu
lesPatchRequest object.

Fields:
  eventThreatDetectionCustomModule: A EventThreatDetectionCustomModule
    resource to be passed as the request body.
  name: Identifier. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
  updateMask: Required. The fields to update. If omitted, then all fields
    are updated.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be updated. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to update the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   r   r   Tr  r#   rH   r   Nr   r   r   r   r   r   r   r0  r   r9   
updateMaskr   r1  r   r   r   r   r?  r?    P    0 &/%;%;<^`a%b"			q4	0$$$Q'*''*,r   r?  c                   `    \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	Sr
g	)
XSecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModulesValidateRequesti	  a  A SecuritycentermanagementFoldersLocationsEventThreatDetectionCustomModu
lesValidateRequest object.

Fields:
  parent: Required. Resource name of the parent to validate the custom
    modules under, in one of the following formats: *
    `organizations/{organization}/locations/{location}`
  validateEventThreatDetectionCustomModuleRequest: A
    ValidateEventThreatDetectionCustomModuleRequest resource to be passed as
    the request body.
r   Tr  /ValidateEventThreatDetectionCustomModuleRequestr   r   Nr   r   r   r   r   r   r   r'  r   /validateEventThreatDetectionCustomModuleRequestr   r   r   r   rD  rD  	  3    
   T2&4=4J4JK|~  5A1r   rD  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	HSecuritycentermanagementFoldersLocationsSecurityCenterServicesGetRequesti  a  A
SecuritycentermanagementFoldersLocationsSecurityCenterServicesGetRequest
object.

Fields:
  name: Required. The Security Command Center service to retrieve, in one of
    the following formats: * organizations/{organization}/locations/{locatio
    n}/securityCenterServices/{service} *
    folders/{folder}/locations/{location}/securityCenterServices/{service} *
    projects/{project}/locations/{location}/securityCenterServices/{service}
    The following values are valid for `{service}`: * `container-threat-
    detection` * `event-threat-detection` * `security-health-analytics` *
    `vm-threat-detection` * `web-security-scanner` * `vm-threat-detection-
    aws` * `cloud-run-threat-detection` * `vm-manager` * `ec2-vulnerability-
    assessment` * `gce-vulnerability-assessment` * `azure-vulnerability-
    assessment` * `notebook-security-scanner` * `artifact-analysis`
  showEligibleModulesOnly: Optional. Set to `true` to show only modules that
    are in scope. By default, all modules are shown.
r   Tr  r   r   Nr   r   r   r   r   r   r   r9   r   showEligibleModulesOnlyr   r   r   r   rJ  rJ    ,    ( 
		q4	0$%2215r   rJ  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9r\R                  " S	5      rS
rg)ISecuritycentermanagementFoldersLocationsSecurityCenterServicesListRequesti3  a  A
SecuritycentermanagementFoldersLocationsSecurityCenterServicesListRequest
object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. The name of the parent to list Security Command Center
    services, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
  showEligibleModulesOnly: Flag that, when set, is used to filter the module
    settings that are shown. The default setting is that all modules are
    shown.
r   r   r   r#   Tr  rH   r   Nr   r   r   r   r   r   r   r   r   r%  r   r&  r'  r   rL  r   r   r   r   rO  rO  3  Z    * ##Ay/@/@/F/FG(##A&)  T2&%2215r   rO  c                       \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	\R                  " S5      r
\R                  " S	5      rS
rg)JSecuritycentermanagementFoldersLocationsSecurityCenterServicesPatchRequestiO  a  A
SecuritycentermanagementFoldersLocationsSecurityCenterServicesPatchRequest
object.

Fields:
  name: Identifier. The name of the service, in one of the following
    formats: * `organizations/{organization}/locations/{location}/securityCe
    nterServices/{service}` *
    `folders/{folder}/locations/{location}/securityCenterServices/{service}`
    * `projects/{project}/locations/{location}/securityCenterServices/{servi
    ce}` The following values are valid for `{service}`: * `container-
    threat-detection` * `event-threat-detection` * `security-health-
    analytics` * `vm-threat-detection` * `web-security-scanner` * `vm-
    threat-detection-aws` * `cloud-run-threat-detection` * `vm-manager` *
    `ec2-vulnerability-assessment` * `gce-vulnerability-assessment` *
    `azure-vulnerability-assessment` * `notebook-security-scanner` *
    `artifact-analysis`
  securityCenterService: A SecurityCenterService resource to be passed as
    the request body.
  updateMask: Optional. Required. The fields to update. Accepts the
    following values: * `intended_enablement_state` * `modules` If omitted,
    then all eligible fields are updated.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no service will be updated. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to update the service could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during update of the
    service Defaults to `false`.
r   Tr  r   r   r#   rH   r   Nr   r   r   r   r   r   r   r9   r   securityCenterServicerA  r   r1  r   r   r   r   rS  rS  O  P    @ 
		q4	0$#001H!L$$Q'*''*,r   rS  c                       \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	\R                  " S5      rS	rg
)YSecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomModulesCreateRequestiv  a,  A SecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomM
odulesCreateRequest object.

Fields:
  parent: Required. Name of the parent organization, folder, or project of
    the module, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
  securityHealthAnalyticsCustomModule: A SecurityHealthAnalyticsCustomModule
    resource to be passed as the request body.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be created. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to create the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   Tr  r   r   r#   r   Nr   r   r   r   r   r   r   r'  r   #securityHealthAnalyticsCustomModuler   r1  r   r   r   r   rX  rX  v  @    *   T2&(1(>(>?dfg(h%''*,r   rX  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	YSecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomModulesDeleteRequesti  a>  A SecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomM
odulesDeleteRequest object.

Fields:
  name: Required. The resource name of the SHA custom module, in one of the
    following formats: * `organizations/{organization}/locations/{location}/
    securityHealthAnalyticsCustomModules/{custom_module}` * `folders/{folder
    }/locations/{location}/securityHealthAnalyticsCustomModules/{custom_modu
    le}` * `projects/{project}/locations/{location}/securityHealthAnalyticsC
    ustomModules/{custom_module}`
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be deleted. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to delete the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during deletion of
    the module Defaults to `false`.
r   Tr  r   r   Nr5  r   r   r   r]  r]    r6  r   r]  c                   :    \ rS rSrSr\R                  " SSS9rSrg)VSecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomModulesGetRequesti  a  A SecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomM
odulesGetRequest object.

Fields:
  name: Required. Name of the resource, in the format `projects/{project}/lo
    cations/{location}/securityHealthAnalyticsCustomModules/{custom_module}`
    .
r   Tr  r   Nr   r   r   r   r_  r_         
		q4	0$r   r_  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)aSecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomModulesListDescendantRequesti  a  A SecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomM
odulesListDescendantRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of the parent organization, folder, or project in
    which to list custom modules, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   rb  rb    r(  r   rb  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)WSecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomModulesListRequesti  a  A SecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomM
odulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of the parent organization, folder, or project in
    which to list custom modules, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   rd  rd    r(  r   rd  c                       \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	\R                  " S5      r
\R                  " S	5      rS
rg)XSecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomModulesPatchRequesti  a  A SecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomM
odulesPatchRequest object.

Fields:
  name: Identifier. The full resource name of the custom module, in one of
    the following formats: * `organizations/{organization}/locations/{locati
    on}/securityHealthAnalyticsCustomModules/{custom_module}` * `folders/{fo
    lder}/locations/{location}/securityHealthAnalyticsCustomModules/{custom_
    module}` * `projects/{project}/locations/{location}/securityHealthAnalyt
    icsCustomModules/{custom_module}`
  securityHealthAnalyticsCustomModule: A SecurityHealthAnalyticsCustomModule
    resource to be passed as the request body.
  updateMask: Optional. Required. The fields to update. The following values
    are valid: * `custom_config` * `enablement_state` If you omit this field
    or set it to the wildcard value `*`, then all eligible fields are
    updated.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be updated. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to update the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   Tr  r   r   r#   rH   r   Nr   r   r   r   r   r   r   r9   r   rZ  rA  r   r1  r   r   r   r   rf  rf    P    4 
		q4	0$(1(>(>?dfg(h%$$Q'*''*,r   rf  c                   `    \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	Sr
g	)
[SecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomModulesSimulateRequesti  a  A SecuritycentermanagementFoldersLocationsSecurityHealthAnalyticsCustomM
odulesSimulateRequest object.

Fields:
  parent: Required. The relative resource name of the organization, project,
    or folder. For more information about relative resource names, see
    [AIP-122: Resource names](https://google.aip.dev/122). Example:
    `organizations/{organization_id}`.
  simulateSecurityHealthAnalyticsCustomModuleRequest: A
    SimulateSecurityHealthAnalyticsCustomModuleRequest resource to be passed
    as the request body.
r   Tr  2SimulateSecurityHealthAnalyticsCustomModuleRequestr   r   Nr   r   r   r   r   r   r   r'  r   2simulateSecurityHealthAnalyticsCustomModuleRequestr   r   r   r   rj  rj    ;       T2&7@7M7M  OC  EF  8G4r   rj  c                   :    \ rS rSrSr\R                  " SSS9rSrg)bSecuritycentermanagementOrganizationsLocationsEffectiveEventThreatDetectionCustomModulesGetRequesti  a>  A SecuritycentermanagementOrganizationsLocationsEffectiveEventThreatDete
ctionCustomModulesGetRequest object.

Fields:
  name: Required. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/effectiveEventThreatDetectionCustomModules/{custom
    _module}` * `folders/{folder}/locations/{location}/effectiveEventThreatD
    etectionCustomModules/{custom_module}` * `projects/{project}/locations/{
    location}/effectiveEventThreatDetectionCustomModules/{custom_module}`
r   Tr  r   Nr   r   r   r   rp  rp    r!  r   rp  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)cSecuritycentermanagementOrganizationsLocationsEffectiveEventThreatDetectionCustomModulesListRequesti(  a  A SecuritycentermanagementOrganizationsLocationsEffectiveEventThreatDete
ctionCustomModulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list effective custom modules, in one
    of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   rr  rr  (  r(  r   rr  c                   :    \ rS rSrSr\R                  " SSS9rSrg)eSecuritycentermanagementOrganizationsLocationsEffectiveSecurityHealthAnalyticsCustomModulesGetRequesti?  a  A SecuritycentermanagementOrganizationsLocationsEffectiveSecurityHealthA
nalyticsCustomModulesGetRequest object.

Fields:
  name: Required. The full resource name of the custom module, specified in
    one of the following formats: * `organizations/organization/{location}/e
    ffectiveSecurityHealthAnalyticsCustomModules/{custom_module}` * `folders
    /folder/{location}/effectiveSecurityHealthAnalyticsCustomModules/{custom
    _module}` * `projects/project/{location}/effectiveSecurityHealthAnalytic
    sCustomModules/{custom_module}`
r   Tr  r   Nr   r   r   r   rt  rt  ?  r!  r   rt  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)fSecuritycentermanagementOrganizationsLocationsEffectiveSecurityHealthAnalyticsCustomModulesListRequestiO  a  A SecuritycentermanagementOrganizationsLocationsEffectiveSecurityHealthA
nalyticsCustomModulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list effective custom modules, in one
    of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   rv  rv  O  r(  r   rv  c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " S5      rS	rg
)\SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCustomModulesCreateRequestif  a  A SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCust
omModulesCreateRequest object.

Fields:
  eventThreatDetectionCustomModule: A EventThreatDetectionCustomModule
    resource to be passed as the request body.
  parent: Required. Name of parent for the module, in one of the following
    formats: * `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be created. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to create the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   r   r   Tr  r#   r   Nr/  r   r   r   rx  rx  f  r2  r   rx  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	\SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCustomModulesDeleteRequesti  aJ  A SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCust
omModulesDeleteRequest object.

Fields:
  name: Required. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be deleted. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to delete the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   Tr  r   r   Nr5  r   r   r   rz  rz    r6  r   rz  c                   :    \ rS rSrSr\R                  " SSS9rSrg)YSecuritycentermanagementOrganizationsLocationsEventThreatDetectionCustomModulesGetRequesti  a  A SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCust
omModulesGetRequest object.

Fields:
  name: Required. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
r   Tr  r   Nr   r   r   r   r|  r|    r!  r   r|  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)dSecuritycentermanagementOrganizationsLocationsEventThreatDetectionCustomModulesListDescendantRequesti  aQ  A SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCust
omModulesListDescendantRequest object.

Fields:
  pageSize: Optional. The maximum number of modules to return. The service
    may return fewer than this value. If unspecified, at most 10 configs
    will be returned. The maximum value is 1000; values above 1000 will be
    coerced to 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list custom modules, in one of the
    following formats: * `organizations/{organization}/locations/{location}`
    * `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r~  r~    r;  r   r~  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)ZSecuritycentermanagementOrganizationsLocationsEventThreatDetectionCustomModulesListRequesti  aG  A SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCust
omModulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of modules to return. The service
    may return fewer than this value. If unspecified, at most 10 modules
    will be returned. The maximum value is 1000; values above 1000 will be
    coerced to 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list custom modules, in one of the
    following formats: * `organizations/{organization}/locations/{location}`
    * `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r  r    r;  r   r  c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " S5      r
\R                  " S	5      rS
rg)[SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCustomModulesPatchRequesti  a  A SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCust
omModulesPatchRequest object.

Fields:
  eventThreatDetectionCustomModule: A EventThreatDetectionCustomModule
    resource to be passed as the request body.
  name: Identifier. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
  updateMask: Required. The fields to update. If omitted, then all fields
    are updated.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be updated. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to update the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   r   r   Tr  r#   rH   r   Nr@  r   r   r   r  r    rB  r   r  c                   `    \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	Sr
g	)
^SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCustomModulesValidateRequesti  a  A SecuritycentermanagementOrganizationsLocationsEventThreatDetectionCust
omModulesValidateRequest object.

Fields:
  parent: Required. Resource name of the parent to validate the custom
    modules under, in one of the following formats: *
    `organizations/{organization}/locations/{location}`
  validateEventThreatDetectionCustomModuleRequest: A
    ValidateEventThreatDetectionCustomModuleRequest resource to be passed as
    the request body.
r   Tr  rE  r   r   NrF  r   r   r   r  r    rH  r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)GSecuritycentermanagementOrganizationsLocationsGetBillingMetadataRequesti	  a7  A
SecuritycentermanagementOrganizationsLocationsGetBillingMetadataRequest
object.

Fields:
  name: Required. The resource to look up the billing tier for, in the
    format
    `organizations/{organization}/locations/{location}/billingMetadata` or
    `projects/{project}/locations/{location}/billingMetadata`.
r   Tr  r   Nr   r   r   r   r  r  	  s    	 
		q4	0$r   r  c                   `    \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	Sr
g	)
ESecuritycentermanagementOrganizationsLocationsOperationsCancelRequesti  zA SecuritycentermanagementOrganizationsLocationsOperationsCancelRequest
object.

Fields:
  cancelOperationRequest: A CancelOperationRequest resource to be passed as
    the request body.
  name: The name of the operation resource to be cancelled.
r;   r   r   Tr  r   Nr   r   r   r   r   r   r   cancelOperationRequestr   r9   r   r   r   r   r  r    /     %112JAN			q4	0$r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)ESecuritycentermanagementOrganizationsLocationsOperationsDeleteRequesti&  zA SecuritycentermanagementOrganizationsLocationsOperationsDeleteRequest
object.

Fields:
  name: The name of the operation resource to be deleted.
r   Tr  r   Nr   r   r   r   r  r  &       
		q4	0$r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)BSecuritycentermanagementOrganizationsLocationsOperationsGetRequesti1  zA SecuritycentermanagementOrganizationsLocationsOperationsGetRequest
object.

Fields:
  name: The name of the operation resource.
r   Tr  r   Nr   r   r   r   r  r  1  r  r   r  c                       \ rS rSrSr\R                  " S5      r\R                  " SSS9r\R                  " S\R                  R                  S9r\R                  " S	5      r\R                  " S
5      rSrg)CSecuritycentermanagementOrganizationsLocationsOperationsListRequesti<  a  A SecuritycentermanagementOrganizationsLocationsOperationsListRequest
object.

Fields:
  filter: The standard list filter.
  name: The name of the operation's parent resource.
  pageSize: The standard list page size.
  pageToken: The standard list page token.
  returnPartialSuccess: When set to `true`, operations that are reachable
    are returned as normal, and those that are unreachable are returned in
    the [ListOperationsResponse.unreachable] field. This can only be `true`
    when reading across collections e.g. when `parent` is set to
    `"projects/example/locations/-"`. This field is not by default supported
    and will result in an `UNIMPLEMENTED` error if set unless explicitly
    documented otherwise in service or product specific documentation.
r   r   Tr  r#   r   rH   rR   r   Nr   r   r   r   r   r   r   filterr9   r   r   r   r%  r&  r   returnPartialSuccessr   r   r   r   r  r  <  sj    "   #&			q4	0$##Ay/@/@/F/FG(##A&)"//2r   r  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	NSecuritycentermanagementOrganizationsLocationsSecurityCenterServicesGetRequestiU  a  A SecuritycentermanagementOrganizationsLocationsSecurityCenterServicesGe
tRequest object.

Fields:
  name: Required. The Security Command Center service to retrieve, in one of
    the following formats: * organizations/{organization}/locations/{locatio
    n}/securityCenterServices/{service} *
    folders/{folder}/locations/{location}/securityCenterServices/{service} *
    projects/{project}/locations/{location}/securityCenterServices/{service}
    The following values are valid for `{service}`: * `container-threat-
    detection` * `event-threat-detection` * `security-health-analytics` *
    `vm-threat-detection` * `web-security-scanner` * `vm-threat-detection-
    aws` * `cloud-run-threat-detection` * `vm-manager` * `ec2-vulnerability-
    assessment` * `gce-vulnerability-assessment` * `azure-vulnerability-
    assessment` * `notebook-security-scanner` * `artifact-analysis`
  showEligibleModulesOnly: Optional. Set to `true` to show only modules that
    are in scope. By default, all modules are shown.
r   Tr  r   r   NrK  r   r   r   r  r  U  s,    & 
		q4	0$%2215r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9r\R                  " S	5      rS
rg)OSecuritycentermanagementOrganizationsLocationsSecurityCenterServicesListRequestim  a  A SecuritycentermanagementOrganizationsLocationsSecurityCenterServicesLi
stRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. The name of the parent to list Security Command Center
    services, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
  showEligibleModulesOnly: Flag that, when set, is used to filter the module
    settings that are shown. The default setting is that all modules are
    shown.
r   r   r   r#   Tr  rH   r   NrP  r   r   r   r  r  m  sZ    ( ##Ay/@/@/F/FG(##A&)  T2&%2215r   r  c                       \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	\R                  " S5      r
\R                  " S	5      rS
rg)PSecuritycentermanagementOrganizationsLocationsSecurityCenterServicesPatchRequesti  a  A SecuritycentermanagementOrganizationsLocationsSecurityCenterServicesPa
tchRequest object.

Fields:
  name: Identifier. The name of the service, in one of the following
    formats: * `organizations/{organization}/locations/{location}/securityCe
    nterServices/{service}` *
    `folders/{folder}/locations/{location}/securityCenterServices/{service}`
    * `projects/{project}/locations/{location}/securityCenterServices/{servi
    ce}` The following values are valid for `{service}`: * `container-
    threat-detection` * `event-threat-detection` * `security-health-
    analytics` * `vm-threat-detection` * `web-security-scanner` * `vm-
    threat-detection-aws` * `cloud-run-threat-detection` * `vm-manager` *
    `ec2-vulnerability-assessment` * `gce-vulnerability-assessment` *
    `azure-vulnerability-assessment` * `notebook-security-scanner` *
    `artifact-analysis`
  securityCenterService: A SecurityCenterService resource to be passed as
    the request body.
  updateMask: Optional. Required. The fields to update. Accepts the
    following values: * `intended_enablement_state` * `modules` If omitted,
    then all eligible fields are updated.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no service will be updated. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to update the service could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during update of the
    service Defaults to `false`.
r   Tr  r   r   r#   rH   r   NrT  r   r   r   r  r    sO    > 
		q4	0$#001H!L$$Q'*''*,r   r  c                       \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	\R                  " S5      rS	rg
)_SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsCustomModulesCreateRequesti  a2  A SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsC
ustomModulesCreateRequest object.

Fields:
  parent: Required. Name of the parent organization, folder, or project of
    the module, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
  securityHealthAnalyticsCustomModule: A SecurityHealthAnalyticsCustomModule
    resource to be passed as the request body.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be created. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to create the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   Tr  r   r   r#   r   NrY  r   r   r   r  r    r[  r   r  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	_SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsCustomModulesDeleteRequesti  aD  A SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsC
ustomModulesDeleteRequest object.

Fields:
  name: Required. The resource name of the SHA custom module, in one of the
    following formats: * `organizations/{organization}/locations/{location}/
    securityHealthAnalyticsCustomModules/{custom_module}` * `folders/{folder
    }/locations/{location}/securityHealthAnalyticsCustomModules/{custom_modu
    le}` * `projects/{project}/locations/{location}/securityHealthAnalyticsC
    ustomModules/{custom_module}`
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be deleted. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to delete the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during deletion of
    the module Defaults to `false`.
r   Tr  r   r   Nr5  r   r   r   r  r    r6  r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)\SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsCustomModulesGetRequesti  a  A SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsC
ustomModulesGetRequest object.

Fields:
  name: Required. Name of the resource, in the format `projects/{project}/lo
    cations/{location}/securityHealthAnalyticsCustomModules/{custom_module}`
    .
r   Tr  r   Nr   r   r   r   r  r    r`  r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)gSecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsCustomModulesListDescendantRequesti  a  A SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsC
ustomModulesListDescendantRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of the parent organization, folder, or project in
    which to list custom modules, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r  r    r(  r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)]SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsCustomModulesListRequesti	  a  A SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsC
ustomModulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of the parent organization, folder, or project in
    which to list custom modules, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r  r  	  r(  r   r  c                       \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	\R                  " S5      r
\R                  " S	5      rS
rg)^SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsCustomModulesPatchRequesti	  a  A SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsC
ustomModulesPatchRequest object.

Fields:
  name: Identifier. The full resource name of the custom module, in one of
    the following formats: * `organizations/{organization}/locations/{locati
    on}/securityHealthAnalyticsCustomModules/{custom_module}` * `folders/{fo
    lder}/locations/{location}/securityHealthAnalyticsCustomModules/{custom_
    module}` * `projects/{project}/locations/{location}/securityHealthAnalyt
    icsCustomModules/{custom_module}`
  securityHealthAnalyticsCustomModule: A SecurityHealthAnalyticsCustomModule
    resource to be passed as the request body.
  updateMask: Optional. Required. The fields to update. The following values
    are valid: * `custom_config` * `enablement_state` If you omit this field
    or set it to the wildcard value `*`, then all eligible fields are
    updated.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be updated. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to update the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   Tr  r   r   r#   rH   r   Nrg  r   r   r   r  r  	  rh  r   r  c                   `    \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	Sr
g	)
aSecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsCustomModulesSimulateRequesti>	  a  A SecuritycentermanagementOrganizationsLocationsSecurityHealthAnalyticsC
ustomModulesSimulateRequest object.

Fields:
  parent: Required. The relative resource name of the organization, project,
    or folder. For more information about relative resource names, see
    [AIP-122: Resource names](https://google.aip.dev/122). Example:
    `organizations/{organization_id}`.
  simulateSecurityHealthAnalyticsCustomModuleRequest: A
    SimulateSecurityHealthAnalyticsCustomModuleRequest resource to be passed
    as the request body.
r   Tr  rk  r   r   Nrl  r   r   r   r  r  >	  rn  r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)]SecuritycentermanagementProjectsLocationsEffectiveEventThreatDetectionCustomModulesGetRequestiP	  a9  A SecuritycentermanagementProjectsLocationsEffectiveEventThreatDetection
CustomModulesGetRequest object.

Fields:
  name: Required. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/effectiveEventThreatDetectionCustomModules/{custom
    _module}` * `folders/{folder}/locations/{location}/effectiveEventThreatD
    etectionCustomModules/{custom_module}` * `projects/{project}/locations/{
    location}/effectiveEventThreatDetectionCustomModules/{custom_module}`
r   Tr  r   Nr   r   r   r   r  r  P	  r!  r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)^SecuritycentermanagementProjectsLocationsEffectiveEventThreatDetectionCustomModulesListRequesti`	  a  A SecuritycentermanagementProjectsLocationsEffectiveEventThreatDetection
CustomModulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list effective custom modules, in one
    of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r  r  `	  r(  r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)`SecuritycentermanagementProjectsLocationsEffectiveSecurityHealthAnalyticsCustomModulesGetRequestiw	  a  A SecuritycentermanagementProjectsLocationsEffectiveSecurityHealthAnalyt
icsCustomModulesGetRequest object.

Fields:
  name: Required. The full resource name of the custom module, specified in
    one of the following formats: * `organizations/organization/{location}/e
    ffectiveSecurityHealthAnalyticsCustomModules/{custom_module}` * `folders
    /folder/{location}/effectiveSecurityHealthAnalyticsCustomModules/{custom
    _module}` * `projects/project/{location}/effectiveSecurityHealthAnalytic
    sCustomModules/{custom_module}`
r   Tr  r   Nr   r   r   r   r  r  w	  r!  r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)aSecuritycentermanagementProjectsLocationsEffectiveSecurityHealthAnalyticsCustomModulesListRequesti	  a  A SecuritycentermanagementProjectsLocationsEffectiveSecurityHealthAnalyt
icsCustomModulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list effective custom modules, in one
    of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r  r  	  r(  r   r  c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " S5      rS	rg
)WSecuritycentermanagementProjectsLocationsEventThreatDetectionCustomModulesCreateRequesti	  a  A SecuritycentermanagementProjectsLocationsEventThreatDetectionCustomMod
ulesCreateRequest object.

Fields:
  eventThreatDetectionCustomModule: A EventThreatDetectionCustomModule
    resource to be passed as the request body.
  parent: Required. Name of parent for the module, in one of the following
    formats: * `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be created. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to create the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   r   r   Tr  r#   r   Nr/  r   r   r   r  r  	  r2  r   r  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	WSecuritycentermanagementProjectsLocationsEventThreatDetectionCustomModulesDeleteRequesti	  aE  A SecuritycentermanagementProjectsLocationsEventThreatDetectionCustomMod
ulesDeleteRequest object.

Fields:
  name: Required. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be deleted. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to delete the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   Tr  r   r   Nr5  r   r   r   r  r  	  r6  r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)TSecuritycentermanagementProjectsLocationsEventThreatDetectionCustomModulesGetRequesti	  a  A SecuritycentermanagementProjectsLocationsEventThreatDetectionCustomMod
ulesGetRequest object.

Fields:
  name: Required. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
r   Tr  r   Nr   r   r   r   r  r  	  r!  r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)_SecuritycentermanagementProjectsLocationsEventThreatDetectionCustomModulesListDescendantRequesti	  aL  A SecuritycentermanagementProjectsLocationsEventThreatDetectionCustomMod
ulesListDescendantRequest object.

Fields:
  pageSize: Optional. The maximum number of modules to return. The service
    may return fewer than this value. If unspecified, at most 10 configs
    will be returned. The maximum value is 1000; values above 1000 will be
    coerced to 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list custom modules, in one of the
    following formats: * `organizations/{organization}/locations/{location}`
    * `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r  r  	  r;  r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)USecuritycentermanagementProjectsLocationsEventThreatDetectionCustomModulesListRequesti	  aB  A SecuritycentermanagementProjectsLocationsEventThreatDetectionCustomMod
ulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of modules to return. The service
    may return fewer than this value. If unspecified, at most 10 modules
    will be returned. The maximum value is 1000; values above 1000 will be
    coerced to 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of parent to list custom modules, in one of the
    following formats: * `organizations/{organization}/locations/{location}`
    * `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r  r  	  r;  r   r  c                       \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	\R                  " S5      r
\R                  " S	5      rS
rg)VSecuritycentermanagementProjectsLocationsEventThreatDetectionCustomModulesPatchRequesti
  a  A SecuritycentermanagementProjectsLocationsEventThreatDetectionCustomMod
ulesPatchRequest object.

Fields:
  eventThreatDetectionCustomModule: A EventThreatDetectionCustomModule
    resource to be passed as the request body.
  name: Identifier. The resource name of the Event Threat Detection custom
    module, in one of the following formats: * `organizations/{organization}
    /locations/{location}/eventThreatDetectionCustomModules/{custom_module}`
    * `folders/{folder}/locations/{location}/eventThreatDetectionCustomModul
    es/{custom_module}` * `projects/{project}/locations/{location}/eventThre
    atDetectionCustomModules/{custom_module}`
  updateMask: Required. The fields to update. If omitted, then all fields
    are updated.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be updated. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to update the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   r   r   Tr  r#   rH   r   Nr@  r   r   r   r  r  
  rB  r   r  c                   `    \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	Sr
g	)
YSecuritycentermanagementProjectsLocationsEventThreatDetectionCustomModulesValidateRequesti0
  a  A SecuritycentermanagementProjectsLocationsEventThreatDetectionCustomMod
ulesValidateRequest object.

Fields:
  parent: Required. Resource name of the parent to validate the custom
    modules under, in one of the following formats: *
    `organizations/{organization}/locations/{location}`
  validateEventThreatDetectionCustomModuleRequest: A
    ValidateEventThreatDetectionCustomModuleRequest resource to be passed as
    the request body.
r   Tr  rE  r   r   NrF  r   r   r   r  r  0
  rH  r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)BSecuritycentermanagementProjectsLocationsGetBillingMetadataRequestiA
  a2  A SecuritycentermanagementProjectsLocationsGetBillingMetadataRequest
object.

Fields:
  name: Required. The resource to look up the billing tier for, in the
    format
    `organizations/{organization}/locations/{location}/billingMetadata` or
    `projects/{project}/locations/{location}/billingMetadata`.
r   Tr  r   Nr   r   r   r   r  r  A
  s     
		q4	0$r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)3SecuritycentermanagementProjectsLocationsGetRequestiO
  zoA SecuritycentermanagementProjectsLocationsGetRequest object.

Fields:
  name: Resource name for the location.
r   Tr  r   Nr   r   r   r   r  r  O
       
		q4	0$r   r  c                       \ rS rSrSr\R                  " SSS9r\R                  " S5      r\R                  " SSS9r	\R                  " S	\R                  R                  S
9r\R                  " S5      rSrg)4SecuritycentermanagementProjectsLocationsListRequestiY
  a  A SecuritycentermanagementProjectsLocationsListRequest object.

Fields:
  extraLocationTypes: Optional. Do not use this field. It is unsupported and
    is ignored unless explicitly documented otherwise. This is primarily for
    internal usage.
  filter: A filter to narrow down results to a preferred subset. The
    filtering language accepts strings like `"displayName=tokyo"`, and is
    documented in more detail in [AIP-160](https://google.aip.dev/160).
  name: The resource that owns the locations collection, if applicable.
  pageSize: The maximum number of results to return. If not set, the service
    selects a default.
  pageToken: A page token received from the `next_page_token` field in the
    response. Send that page token to receive the subsequent page.
r   Tr   r   r#   r  rH   r   rR   r   N)r   r   r   r   r   r   r   extraLocationTypesr  r9   r   r   r   r%  r&  r   r   r   r   r  r  Y
  sl      !,,Q>  #&			q4	0$##Ay/@/@/F/FG(##A&)r   r  c                   `    \ rS rSrSr\R                  " SS5      r\R                  " SSS9r	Sr
g	)
@SecuritycentermanagementProjectsLocationsOperationsCancelRequestiq
  zA SecuritycentermanagementProjectsLocationsOperationsCancelRequest
object.

Fields:
  cancelOperationRequest: A CancelOperationRequest resource to be passed as
    the request body.
  name: The name of the operation resource to be cancelled.
r;   r   r   Tr  r   Nr  r   r   r   r  r  q
  r  r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)@SecuritycentermanagementProjectsLocationsOperationsDeleteRequesti
  zA SecuritycentermanagementProjectsLocationsOperationsDeleteRequest
object.

Fields:
  name: The name of the operation resource to be deleted.
r   Tr  r   Nr   r   r   r   r  r  
  r  r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)=SecuritycentermanagementProjectsLocationsOperationsGetRequesti
  z}A SecuritycentermanagementProjectsLocationsOperationsGetRequest object.

Fields:
  name: The name of the operation resource.
r   Tr  r   Nr   r   r   r   r  r  
  r  r   r  c                       \ rS rSrSr\R                  " S5      r\R                  " SSS9r\R                  " S\R                  R                  S9r\R                  " S	5      r\R                  " S
5      rSrg)>SecuritycentermanagementProjectsLocationsOperationsListRequesti
  a  A SecuritycentermanagementProjectsLocationsOperationsListRequest object.

Fields:
  filter: The standard list filter.
  name: The name of the operation's parent resource.
  pageSize: The standard list page size.
  pageToken: The standard list page token.
  returnPartialSuccess: When set to `true`, operations that are reachable
    are returned as normal, and those that are unreachable are returned in
    the [ListOperationsResponse.unreachable] field. This can only be `true`
    when reading across collections e.g. when `parent` is set to
    `"projects/example/locations/-"`. This field is not by default supported
    and will result in an `UNIMPLEMENTED` error if set unless explicitly
    documented otherwise in service or product specific documentation.
r   r   Tr  r#   r   rH   rR   r   Nr  r   r   r   r  r  
  sj        #&			q4	0$##Ay/@/@/F/FG(##A&)"//2r   r  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	ISecuritycentermanagementProjectsLocationsSecurityCenterServicesGetRequesti
  a  A
SecuritycentermanagementProjectsLocationsSecurityCenterServicesGetRequest
object.

Fields:
  name: Required. The Security Command Center service to retrieve, in one of
    the following formats: * organizations/{organization}/locations/{locatio
    n}/securityCenterServices/{service} *
    folders/{folder}/locations/{location}/securityCenterServices/{service} *
    projects/{project}/locations/{location}/securityCenterServices/{service}
    The following values are valid for `{service}`: * `container-threat-
    detection` * `event-threat-detection` * `security-health-analytics` *
    `vm-threat-detection` * `web-security-scanner` * `vm-threat-detection-
    aws` * `cloud-run-threat-detection` * `vm-manager` * `ec2-vulnerability-
    assessment` * `gce-vulnerability-assessment` * `azure-vulnerability-
    assessment` * `notebook-security-scanner` * `artifact-analysis`
  showEligibleModulesOnly: Optional. Set to `true` to show only modules that
    are in scope. By default, all modules are shown.
r   Tr  r   r   NrK  r   r   r   r  r  
  rM  r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9r\R                  " S	5      rS
rg)JSecuritycentermanagementProjectsLocationsSecurityCenterServicesListRequesti
  a  A
SecuritycentermanagementProjectsLocationsSecurityCenterServicesListRequest
object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. The name of the parent to list Security Command Center
    services, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
  showEligibleModulesOnly: Flag that, when set, is used to filter the module
    settings that are shown. The default setting is that all modules are
    shown.
r   r   r   r#   Tr  rH   r   NrP  r   r   r   r  r  
  rQ  r   r  c                       \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	\R                  " S5      r
\R                  " S	5      rS
rg)KSecuritycentermanagementProjectsLocationsSecurityCenterServicesPatchRequesti
  a  A
SecuritycentermanagementProjectsLocationsSecurityCenterServicesPatchRequest
object.

Fields:
  name: Identifier. The name of the service, in one of the following
    formats: * `organizations/{organization}/locations/{location}/securityCe
    nterServices/{service}` *
    `folders/{folder}/locations/{location}/securityCenterServices/{service}`
    * `projects/{project}/locations/{location}/securityCenterServices/{servi
    ce}` The following values are valid for `{service}`: * `container-
    threat-detection` * `event-threat-detection` * `security-health-
    analytics` * `vm-threat-detection` * `web-security-scanner` * `vm-
    threat-detection-aws` * `cloud-run-threat-detection` * `vm-manager` *
    `ec2-vulnerability-assessment` * `gce-vulnerability-assessment` *
    `azure-vulnerability-assessment` * `notebook-security-scanner` *
    `artifact-analysis`
  securityCenterService: A SecurityCenterService resource to be passed as
    the request body.
  updateMask: Optional. Required. The fields to update. Accepts the
    following values: * `intended_enablement_state` * `modules` If omitted,
    then all eligible fields are updated.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no service will be updated. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to update the service could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during update of the
    service Defaults to `false`.
r   Tr  r   r   r#   rH   r   NrT  r   r   r   r  r  
  rV  r   r  c                       \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	\R                  " S5      rS	rg
)ZSecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustomModulesCreateRequesti  a-  A SecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustom
ModulesCreateRequest object.

Fields:
  parent: Required. Name of the parent organization, folder, or project of
    the module, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
  securityHealthAnalyticsCustomModule: A SecurityHealthAnalyticsCustomModule
    resource to be passed as the request body.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be created. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to create the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   Tr  r   r   r#   r   NrY  r   r   r   r  r    r[  r   r  c                   ^    \ rS rSrSr\R                  " SSS9r\R                  " S5      r	Sr
g)	ZSecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustomModulesDeleteRequesti#  a?  A SecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustom
ModulesDeleteRequest object.

Fields:
  name: Required. The resource name of the SHA custom module, in one of the
    following formats: * `organizations/{organization}/locations/{location}/
    securityHealthAnalyticsCustomModules/{custom_module}` * `folders/{folder
    }/locations/{location}/securityHealthAnalyticsCustomModules/{custom_modu
    le}` * `projects/{project}/locations/{location}/securityHealthAnalyticsC
    ustomModules/{custom_module}`
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be deleted. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to delete the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during deletion of
    the module Defaults to `false`.
r   Tr  r   r   Nr5  r   r   r   r  r  #  r6  r   r  c                   :    \ rS rSrSr\R                  " SSS9rSrg)WSecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustomModulesGetRequesti<  a  A SecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustom
ModulesGetRequest object.

Fields:
  name: Required. Name of the resource, in the format `projects/{project}/lo
    cations/{location}/securityHealthAnalyticsCustomModules/{custom_module}`
    .
r   Tr  r   Nr   r   r   r   r  r  <  r`  r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)bSecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustomModulesListDescendantRequestiI  a  A SecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustom
ModulesListDescendantRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of the parent organization, folder, or project in
    which to list custom modules, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r  r  I  r(  r   r  c                       \ rS rSrSr\R                  " S\R                  R                  S9r	\R                  " S5      r\R                  " SSS9rS	rg
)XSecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustomModulesListRequesti`  a	  A SecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustom
ModulesListRequest object.

Fields:
  pageSize: Optional. The maximum number of results to return in a single
    response. Default is 10, minimum is 1, maximum is 1000.
  pageToken: Optional. A pagination token returned from a previous request.
    Provide this token to retrieve the next page of results. When
    paginating, the rest of the request must match the request that
    generated the page token.
  parent: Required. Name of the parent organization, folder, or project in
    which to list custom modules, in one of the following formats: *
    `organizations/{organization}/locations/{location}` *
    `folders/{folder}/locations/{location}` *
    `projects/{project}/locations/{location}`
r   r   r   r#   Tr  r   Nr$  r   r   r   r  r  `  r(  r   r  c                       \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	\R                  " S5      r
\R                  " S	5      rS
rg)YSecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustomModulesPatchRequestiw  a  A SecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustom
ModulesPatchRequest object.

Fields:
  name: Identifier. The full resource name of the custom module, in one of
    the following formats: * `organizations/{organization}/locations/{locati
    on}/securityHealthAnalyticsCustomModules/{custom_module}` * `folders/{fo
    lder}/locations/{location}/securityHealthAnalyticsCustomModules/{custom_
    module}` * `projects/{project}/locations/{location}/securityHealthAnalyt
    icsCustomModules/{custom_module}`
  securityHealthAnalyticsCustomModule: A SecurityHealthAnalyticsCustomModule
    resource to be passed as the request body.
  updateMask: Optional. Required. The fields to update. The following values
    are valid: * `custom_config` * `enablement_state` If you omit this field
    or set it to the wildcard value `*`, then all eligible fields are
    updated.
  validateOnly: Optional. When set to `true`, the request will be validated
    (including IAM checks), but no module will be updated. An `OK` response
    indicates that the request is valid, while an error response indicates
    that the request is invalid. If the request is valid, a subsequent
    request to update the module could still fail for one of the following
    reasons: * The state of your cloud resources changed; for example, you
    lost a required IAM permission * An error occurred during creation of
    the module Defaults to `false`.
r   Tr  r   r   r#   rH   r   Nrg  r   r   r   r  r  w  rh  r   r  c                   `    \ rS rSrSr\R                  " SSS9r\R                  " SS5      r	Sr
g	)
\SecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustomModulesSimulateRequesti  a  A SecuritycentermanagementProjectsLocationsSecurityHealthAnalyticsCustom
ModulesSimulateRequest object.

Fields:
  parent: Required. The relative resource name of the organization, project,
    or folder. For more information about relative resource names, see
    [AIP-122: Resource names](https://google.aip.dev/122). Example:
    `organizations/{organization_id}`.
  simulateSecurityHealthAnalyticsCustomModuleRequest: A
    SimulateSecurityHealthAnalyticsCustomModuleRequest resource to be passed
    as the request body.
r   Tr  rk  r   r   Nrl  r   r   r   r  r    rn  r   r  c                   d    \ rS rSrSr\R                  " SS5      r\R                  " SS5      rSr	g)	rk  i  a  Request message for
SecurityCenterManagement.SimulateSecurityHealthAnalyticsCustomModule. The
maximum size of the request is 4 MiB.

Fields:
  customConfig: Required. The custom configuration that you need to test.
  resource: Required. Resource data to simulate custom module against.
rC   r   SimulatedResourcer   r   N)
r   r   r   r   r   r   r   r   resourcer   r   r   r   rk  rk    s.     '':,##$7;(r   rk  c                   >    \ rS rSrSr\R                  " SS5      rSrg)3SimulateSecurityHealthAnalyticsCustomModuleResponsei  zResponse message for
SecurityCenterManagement.SimulateSecurityHealthAnalyticsCustomModule.

Fields:
  result: Result for test case in the corresponding request.
SimulatedResultr   r   N)	r   r   r   r   r   r   r   resultr   r   r   r   r  r    s     !!"3Q7&r   r  c                   6   \ rS rSrSr " S S\R                  5      r " S S\R                  5      r " S S\R                  5      r	\
R                  " S	5       " S
 S\R                  5      5       r\R                  " S5      r\R                  " S5      r\R"                  " SS5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R"                  " SS5      r\R.                  " SS5      r\R"                  " SS5      rSrg)SimulatedFindingi  a
  The minimum set of fields needed to represent a simulated finding from a
Security Health Analytics custom module.

Enums:
  FindingClassValueValuesEnum: The class of the finding.
  SeverityValueValuesEnum: The severity of the finding. This field is
    managed by the source that writes the finding.
  StateValueValuesEnum: Output only. The state of the finding.

Messages:
  SourcePropertiesValue: Source-specific properties. These properties are
    managed by the source that writes the finding. The key names must be
    between 1 and 255 characters; they must start with a letter and contain
    alphanumeric characters or underscores only.

Fields:
  category: The additional taxonomy group within findings from a given
    source. For example, `XSS_FLASH_INJECTION`. This field is immutable
    after creation time.
  eventTime: The time the finding was first detected. If an existing finding
    is updated, then this is the time the update occurred. If the finding is
    later resolved, then this time reflects when the finding was resolved.
    For example, if the finding represents an open firewall, this property
    captures the time the detector believes the firewall became open. The
    accuracy is determined by the detector. The event time must not be set
    to a value greater than the current timestamp.
  findingClass: The class of the finding.
  name: Identifier. The [relative resource name](https://google.aip.dev/122)
    of the finding, in one of the following formats: * `organizations/{organ
    ization_id}/sources/{source_id}/findings/{finding_id}` *
    `folders/{folder_id}/sources/{source_id}/findings/{finding_id}` *
    `projects/{project_id}/sources/{source_id}/findings/{finding_id}`
  parent:  The [relative resource name](https://google.aip.dev/122) of the
    source the finding belongs to. For example,
    `organizations/{organization_id}/sources/{source_id}`. This field is
    immutable after creation time.
  resourceName: For findings on Google Cloud resources, the [full resource
    name](https://google.aip.dev/122#full-resource-names) of the Google
    Cloud resource this finding is for. When the finding is for a non-Google
    Cloud resource, the value can be a customer or partner defined string.
    This field is immutable after creation time.
  severity: The severity of the finding. This field is managed by the source
    that writes the finding.
  sourceProperties: Source-specific properties. These properties are managed
    by the source that writes the finding. The key names must be between 1
    and 255 characters; they must start with a letter and contain
    alphanumeric characters or underscores only.
  state: Output only. The state of the finding.
c                   <    \ rS rSrSrSrSrSrSrSr	Sr
S	rS
rSrSrg),SimulatedFinding.FindingClassValueValuesEnumi  a  The class of the finding.

Values:
  FINDING_CLASS_UNSPECIFIED: Default value. This value is unused.
  THREAT: Describes unwanted or malicious activity.
  VULNERABILITY: Describes a potential weakness in software that increases
    risk to confidentiality, integrity, and availability.
  MISCONFIGURATION: Describes a potential weakness in cloud resource or
    asset configuration that increases risk.
  OBSERVATION: Describes a security observation that is for informational
    purposes.
  SCC_ERROR: Describes an error that prevents Security Command Center from
    working correctly.
  POSTURE_VIOLATION: Describes a potential security risk due to a change
    in the security posture.
  TOXIC_COMBINATION: Describes a combination of security issues that
    represent a more severe security problem when taken together.
  CHOKEPOINT: Describes a resource or resource group where high risk
    attack paths converge, based on attack path simulations (APS).
r   r   r   r#   rH   rR   rT   rU   r   r   N)r   r   r   r   r   FINDING_CLASS_UNSPECIFIEDTHREATVULNERABILITYMISCONFIGURATIONOBSERVATION	SCC_ERRORPOSTURE_VIOLATIONTOXIC_COMBINATION
CHOKEPOINTr   r   r   r   FindingClassValueValuesEnumr    s:    ( !"FMKIJr   r  c                   ,    \ rS rSrSrSrSrSrSrSr	Sr
g	)
(SimulatedFinding.SeverityValueValuesEnumi  a

  The severity of the finding. This field is managed by the source that
writes the finding.

Values:
  SEVERITY_UNSPECIFIED: Default value. This value is unused.
  CRITICAL: For vulnerabilities: A critical vulnerability is easily
    discoverable by an external actor, exploitable, and results in the
    direct ability to execute arbitrary code, exfiltrate data, and
    otherwise gain additional access and privileges to cloud resources and
    workloads. Examples include publicly accessible unprotected user data
    and public SSH access with weak or no passwords. For threats:
    Indicates a threat that is able to access, modify, or delete data or
    execute unauthorized code within existing resources.
  HIGH: For vulnerabilities: A high-risk vulnerability can be easily
    discovered and exploited in combination with other vulnerabilities in
    order to gain direct access and the ability to execute arbitrary code,
    exfiltrate data, and otherwise gain additional access and privileges
    to cloud resources and workloads. An example is a database with weak
    or no passwords that is only accessible internally. This database
    could easily be compromised by an actor that had access to the
    internal network. For threats: Indicates a threat that is able to
    create new computational resources in an environment but not able to
    access data or execute code in existing resources.
  MEDIUM: For vulnerabilities: A medium-risk vulnerability could be used
    by an actor to gain access to resources or privileges that enable them
    to eventually (through multiple steps or a complex exploit) gain
    access and the ability to execute arbitrary code or exfiltrate data.
    An example is a service account with access to more projects than it
    should have. If an actor gains access to the service account, they
    could potentially use that access to manipulate a project the service
    account was not intended to. For threats: Indicates a threat that is
    able to cause operational impact but may not access data or execute
    unauthorized code.
  LOW: For vulnerabilities: A low-risk vulnerability hampers a security
    organization's ability to detect vulnerabilities or active threats in
    their deployment, or prevents the root cause investigation of security
    issues. An example is monitoring and logs being disabled for resource
    configurations and access. For threats: Indicates a threat that has
    obtained minimal access to an environment but is not able to access
    data, execute code, or create resources.
r   r   r   r#   rH   r   NrI   r   r   r   rO   r    s$    (R HDF
Cr   rO   c                   $    \ rS rSrSrSrSrSrSrg)%SimulatedFinding.StateValueValuesEnumiE  a'  Output only. The state of the finding.

Values:
  STATE_UNSPECIFIED: Default value. This value is unused.
  ACTIVE: The finding requires attention and has not been addressed yet.
  INACTIVE: The finding has been fixed, triaged as a non-issue, or
    otherwise addressed and is no longer active.
r   r   r   r   N)	r   r   r   r   r   STATE_UNSPECIFIEDACTIVEINACTIVEr   r   r   r   StateValueValuesEnumr  E  s     FHr   r   rs   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
&SimulatedFinding.SourcePropertiesValueiR  a  Source-specific properties. These properties are managed by the source
that writes the finding. The key names must be between 1 and 255
characters; they must start with a letter and contain alphanumeric
characters or underscores only.

Messages:
  AdditionalProperty: An additional property for a SourcePropertiesValue
    object.

Fields:
  additionalProperties: Additional properties of type
    SourcePropertiesValue
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)9SimulatedFinding.SourcePropertiesValue.AdditionalPropertyib  zAn additional property for a SourcePropertiesValue object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   ry   r   r   Nrz   r   r   r   r}   r  b  r~   r   r}   r   Tr   r   Nr   r   r   r   SourcePropertiesValuer  R  s4    	AY.. 	A %112FTXYr   r  r   r   r#   rH   rR   rT   rU   r   r   r   N)r   r   r   r   r   r   r)   r  rO   r   r   r   r   r  r   category	eventTimer+   findingClassr9   r'  resourceNamer\   r   sourcePropertiesstater   r   r   r   r  r    s   0dINN >.	 .`Y^^  !!"89Zi// Z :Z8 ""1%(##A&)$$%BAF,			q	!$  #&&&q),  !:A>(++,CQG


4a
8%r   r  c                       \ rS rSrSr\R                  " S5       " S S\R                  5      5       r	\R                  " SS5      r\R                  " SS5      r\R                  " S	5      rS
rg)r  iz  a  Manually constructed information about a resource.

Messages:
  ResourceDataValue: Optional. A representation of the Google Cloud
    resource. Should match the Google Cloud resource JSON format. If the
    custom module evaluates only the IAM allow policy, then you can omit
    this field.

Fields:
  iamPolicyData: Optional. A representation of the IAM allow policy. If the
    custom module evaluates only the resource data, then you can omit this
    field.
  resourceData: Optional. A representation of the Google Cloud resource.
    Should match the Google Cloud resource JSON format. If the custom module
    evaluates only the IAM allow policy, then you can omit this field.
  resourceType: Required. The type of the resource. For example,
    `compute.googleapis.com/Disk`.
rs   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
#SimulatedResource.ResourceDataValuei  a\  Optional. A representation of the Google Cloud resource. Should match
the Google Cloud resource JSON format. If the custom module evaluates only
the IAM allow policy, then you can omit this field.

Messages:
  AdditionalProperty: An additional property for a ResourceDataValue
    object.

Fields:
  additionalProperties: Properties of the object.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)6SimulatedResource.ResourceDataValue.AdditionalPropertyi  zAn additional property for a ResourceDataValue object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   ry   r   r   Nrz   r   r   r   r}   r    r~   r   r}   r   Tr   r   Nr   r   r   r   ResourceDataValuer    s4    
	AY.. 	A %112FTXYr   r  r   r   r   r#   r   N)r   r   r   r   r   r   r   r   r   r  r   iamPolicyDataresourceDatar   resourceTyper   r   r   r   r  r  z  sn    & !!"89Z)++ Z :Z4 ((15-''(;Q?,&&q),r   r  c                       \ rS rSrSr\R                  " SS5      r\R                  " SS5      r\R                  " SS5      r	S	r
g
)r  i  zPossible test result.

Fields:
  error: Error encountered during the test.
  finding: Finding that would be published for the test case if a violation
    is detected.
  noViolation: Indicates that the test case does not trigger any violation.
r   r   r  r   r   r#   r   N)r   r   r   r   r   r   r   r   findingnoViolationr   r   r   r   r  r    s@     
 
 1
-%""#5q9'&&w2+r   r  c                      \ rS rSrSr " S S\R                  5      r " S S\R                  5      r\R                  " SS5      r
\R                  " S5      r\R                  " SS	S
S9r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R$                  " SSS9r\R                  " S5      r\R                  " S5      r\R                  " S5      r\R                  " S5      rSrg)StandardQueryParametersi  a  Query parameters accepted by all methods.

Enums:
  FXgafvValueValuesEnum: V1 error format.
  AltValueValuesEnum: Data format for response.

Fields:
  f__xgafv: V1 error format.
  access_token: OAuth access token.
  alt: Data format for response.
  callback: JSONP
  fields: Selector specifying which fields to include in a partial response.
  key: API key. Your API key identifies your project and provides you with
    API access, quota, and reports. Required unless you provide an OAuth 2.0
    token.
  oauth_token: OAuth 2.0 token for the current user.
  prettyPrint: Returns response with indentations and line breaks.
  quotaUser: Available to use for quota purposes for server-side
    applications. Can be any arbitrary string assigned to a user, but should
    not exceed 40 characters.
  trace: A tracing token of the form "token:<tokenid>" to include in api
    requests.
  uploadType: Legacy upload protocol for media (e.g. "media", "multipart").
  upload_protocol: Upload protocol for media (e.g. "raw", "multipart").
c                   $    \ rS rSrSrSrSrSrSrg)*StandardQueryParameters.AltValueValuesEnumi  zData format for response.

Values:
  json: Responses with Content-Type of application/json
  media: Media download with context-dependent Content-Type
  proto: Responses with Content-Type of application/x-protobuf
r   r   r   r   N)	r   r   r   r   r   jsonmediaprotor   r   r   r   AltValueValuesEnumr    s     DEEr   r  c                        \ rS rSrSrSrSrSrg)-StandardQueryParameters.FXgafvValueValuesEnumi  zFV1 error format.

Values:
  _1: v1 error format
  _2: v2 error format
r   r   r   N)r   r   r   r   r   _1_2r   r   r   r   FXgafvValueValuesEnumr!    s     
B	
Br   r$  r   r   r#   r  )defaultrH   rR   rT   rU   r   Tr   
         r   N)r   r   r   r   r   r   r)   r  r$  r+   f__xgafvr   access_tokenaltcallbackfieldsr{   oauth_tokenr   prettyPrint	quotaUsertrace
uploadTypeupload_protocolr   r   r   r   r  r    s    4
9>> 
inn    !8!<(&&q),0!VD#""1%(  #&a #%%a(+&&q$7+##A&)



#%$$R(*))"-/r   r  c                       \ rS rSrSr\R                  " S5       " S S\R                  5      5       r	\R                  " S\R                  R                  S9r\R                  " SSS	S
9r\R                   " S5      rSrg)r   i  a  The `Status` type defines a logical error model that is suitable for
different programming environments, including REST APIs and RPC APIs. It is
used by [gRPC](https://github.com/grpc). Each `Status` message contains
three pieces of data: error code, error message, and error details. You can
find out more about this error model and how to work with it in the [API
Design Guide](https://cloud.google.com/apis/design/errors).

Messages:
  DetailsValueListEntry: A DetailsValueListEntry object.

Fields:
  code: The status code, which should be an enum value of google.rpc.Code.
  details: A list of messages that carry the error details. There is a
    common set of message types for APIs to use.
  message: A developer-facing error message, which should be in English. Any
    user-facing error message should be localized and sent in the
    google.rpc.Status.details field, or localized by the client.
rs   c                   f    \ rS rSrSr " S S\R                  5      r\R                  " SSSS9r	Sr
g	)
Status.DetailsValueListEntryi  zA DetailsValueListEntry object.

Messages:
  AdditionalProperty: An additional property for a DetailsValueListEntry
    object.

Fields:
  additionalProperties: Properties of the object. Contains field @type
    with type URL.
c                   b    \ rS rSrSr\R                  " S5      r\R                  " SS5      r	Sr
g)/Status.DetailsValueListEntry.AdditionalPropertyi  zAn additional property for a DetailsValueListEntry object.

Fields:
  key: Name of the additional property.
  value: A extra_types.JsonValue attribute.
r   ry   r   r   Nrz   r   r   r   r}   r8    r~   r   r}   r   Tr   r   Nr   r   r   r   DetailsValueListEntryr6    r   r   r9  r   r   r   Tr   r#   r   N)r   r   r   r   r   r   r   r   r   r9  r   r   r   coder   detailsr   messager   r   r   r   r   r     s|    & !!"89Zi// Z :Z2 
		9+<+<+B+B	C$""#:AM'!!!$'r   r   c                   `    \ rS rSrSr\R                  " S5      r\R                  " S5      rSr	g)rE  i/  a  Request message for
SecurityCenterManagement.ValidateEventThreatDetectionCustomModule.

Fields:
  rawText: Required. The raw text of the module's contents. Used to generate
    error messages.
  type: Required. The type of the module. For example,
    `CONFIGURABLE_BAD_IP`.
r   r   r   N)
r   r   r   r   r   r   r   rawTextr   r   r   r   r   rE  rE  /  s)     !!!$'			q	!$r   rE  c                   <    \ rS rSrSr\R                  " SSSS9rSrg)	0ValidateEventThreatDetectionCustomModuleResponsei>  zResponse message for
SecurityCenterManagement.ValidateEventThreatDetectionCustomModule.

Fields:
  errors: A list of errors returned by the validator. If the list is empty,
    there were no errors.
r^   r   Tr   r   N)	r   r   r   r   r   r   r   errorsr   r   r   r   r@  r@  >  s     !!"?TR&r   r@  r)  z$.xgafvr"  1r#  2N)r   
__future__r   apitools.base.protorpcliter   r   apitools.base.pyr   r   packager   r	   r   r.   r;   r?   rC   r^   rP   ri   r   r   r   rQ   r   r   r   r   r   r   r   r   r   r   r   r   r   r   r`   rf   rS   r   r   r  r#  r*  r,  r.  r4  r8  r:  r=  r?  rD  rJ  rO  rS  rX  r]  r_  rb  rd  rf  rj  rp  rr  rt  rv  rx  rz  r|  r~  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  r  rk  r  r  r  r  r  r   rE  r@  AddCustomJsonFieldMappingAddCustomJsonEnumMappingr$  r   r   r   <module>rJ     s	   ' < % ( %%)## %:=Y&& =D"i'' "@=Y.. ="I%% "45?9$$ 5?p0)"3"3 0.
Dy(( 
DI"	0A0A I"X-"93D3D -"`I [(y'8'8 [(|!#9 !#HM")"3"3 M"`T"** T"n+i>O>O +yARAR y+Y=N=N ++	@Q@Q ++I4E4E +
+I-- 
+8Y.. 8$]):): ]yy7H7H yE]Y&& E]Pi8	!! i8XKGY KG\	Jy   	J6y   6:y(( :a(I-- a(H=()*;*; =(@1clctct 1 3dmdudu 3.1fofwfw 1 3gpgxgx 3.+]f]n]n +4+]f]n]n +21ZcZkZk 1 3enevev 303[d[l[l 30+\e\m\m +>A_h_p_p A"6yO`O` 626PYPaPa 68$+QZQbQb $+N+`i`q`q +6+`i`q`q +2
1]f]n]n 
13hqhyhy 3.3^g^o^o 3.+_h_p_p +BGbkbsbs G$1iriziz 1 3jsj{j{ 3.1lul}l} 1 3mvm~m~ 3.+clctct +4+clctct +21`i`q`q 1 3ktk|k| 303ajarar 30+bkbsbs +>Aenevev A"1iN_N_ 11IL]L] 11IL]L] 11IZIZ 13)J[J[ 326U^UfUf 606V_VgVg 66#+W`WhWh #+L+fofwfw +6+fofwfw +2
1clctct 
13nwnn 3.3dmdudu 3.+enevev +BGhqhyhy G$1dmdudu 1 3enevev 3.1gpgxgx 1 3hqhyhy 3.+^g^o^o +4+^g^o^o +21[d[l[l 1 3fofwfw 303\e\m\m 30+]f]n]n +>A`i`q`q A"1IZIZ 11):K:K 1'9;L;L '01yGXGX 11yGXGX 11IDUDU 13YEVEV 306PYPaPa 626QZQbQb 68$+R[RcRc $+N+ajarar +6+ajarar +2
1^g^o^o 
13iriziz 3.3_h_p_p 3.+`i`q`q +BGclctct G$<9J9J <8):K:K 8t9y(( t9n1*	)) 1*h3i'' 3<.i// <.~0%Y 0%f"i6G6G "	Sy7H7H 	S 	 " "Z4  ! !114>  ! !114>r   