
    7                         S r SSKJr  SSKJr  SSKJr  SSKJr  SSKJr  SSKJ	r	  SS	S
.r
S rS r\	R                  " \	R                  R                  5       " S S\	R                   5      5       rg)z5Command to call batch get Effective IAM Policies API.    )absolute_import)division)unicode_literals)client_util)arg_parsers)basez?    Batch get effective IAM policies that match a request.
    a      To list effective IAM policies of 1 resource in an organization, run:

      $ {command} --scope=organizations/YOUR_ORG_ID --names=RESOURCE_NAME1

    To list effective IAM policies of 2 resources in a folder, run:

      $ {command} --scope=folders/YOUR_FOLDER_ID --names=RESOURCE_NAME1,RESOURCE_NAME2

    To list effective IAM policies of 3 resources in a project using project ID, run:

      $ {command} --scope=projects/YOUR_PROJECT_ID --names=RESOURCE_NAME1,RESOURCE_NAME2,RESOURCE_NAME3

    To list effective IAM policies of 2 resources in a project using project number, run:

      $ {command} --scope=projects/YOUR_PROJECT_NUMBER --names=RESOURCE_NAME1,RESOURCE_NAME2
    )DESCRIPTIONEXAMPLESc                 (    U R                  SSSSS9  g )Nz--scopeSCOPETa          Scope can be a project, a folder, or an organization. The search is
        limited to the IAM policies within this scope. The caller must be
        granted the ``cloudasset.assets.analyzeIamPolicy'',
        ``cloudasset.assets.searchAllResources'',
        ``cloudasset.assets.searchAllIamPolicies'' permissions
        on the desired scope.

        The allowed values are:

          * ```projects/{PROJECT_ID}``` (e.g. ``projects/foo-bar'')
          * ```projects/{PROJECT_NUMBER}``` (e.g. ``projects/12345678'')
          * ```folders/{FOLDER_NUMBER}``` (e.g. ``folders/1234567'')
          * ```organizations/{ORGANIZATION_NUMBER}``` (e.g. ``organizations/123456'')
        )metavarrequiredhelp)add_argumentparsers    -lib/surface/asset/get_effective_iam_policy.pyAddScopeArgumentr   4   s#    	      c           	      P    U R                  SS[        R                  " SSS9SSS9  g )	Nz--namesNAMES      )
min_length
max_lengthTa          Names refer to a list of
        [full resource names](https://cloud.google.com/asset-inventory/docs/resource-name-format)
        of [searchable asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-types).
        For each batch call, total number of names provided is between 1 and 20.

        The example value is:

          * ```//cloudsql.googleapis.com/projects/{PROJECT_ID}/instances/{INSTANCE}```
          (e.g. ``//cloudsql.googleapis.com/projects/probe-per-rt-project/instances/instance1'')
        )r   typer   r   )r   r   ArgListr   s    r   AddNamesArgumentr   J   s3    !;
  r   c                   2    \ rS rSrSr\r\S 5       rS r	Sr
g)EffectiveIAMPolicyGA`   zGet effective IAM policies for a specified list of resources within accessible scope, such as a project, folder or organization.c                 0    [        U 5        [        U 5        g N)r   r   r   s    r   ArgsEffectiveIAMPolicyGA.Argsf   s    VVr   c                 N    [         R                  " 5       nUR                  U5      $ r#   )r   EffectiveIAMPolicyClientBatchGetEffectiveIAMPolicies)selfargsclients      r   RunEffectiveIAMPolicyGA.Runk   s!    113F..t44r    N)__name__
__module____qualname____firstlineno____doc__DETAILED_HELPdetailed_helpstaticmethodr$   r,   __static_attributes__r.   r   r   r    r    `   s$     I- 5r   r    N)r3   
__future__r   r   r   googlecloudsdk.api_lib.assetr   googlecloudsdk.callioper   r   r4   r   r   ReleaseTracksReleaseTrackGACommandr    r.   r   r   <module>r?      sm    < &  ' 4 / (
		4,, D%%(()54<< 5 *5r   