@@ -171,60 +171,61 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
171
171
+ "_attributes\030 \t \001 (\013 2\027 .google.protobuf.Stru"
172
172
+ "ct\022 !\n \031 parent_full_resource_name\030 \023 \001 (\t \022 \031 \n "
173
173
+ "\021 parent_asset_type\030 g \001 (\t \032 -\n \013 LabelsEntry\022 "
174
- + "\013 \n \003 key\030 \001 \001 (\t \022 \r \n \005 value\030 \002 \001 (\t :\002 8\001 \" \324 \003 \n \025 IamP"
175
- + "olicySearchResult\022 \020 \n \010 resource\030 \001 \001 (\t \022 \017 \n \007 p"
176
- + "roject\030 \002 \001 (\t \022 %\n \006 policy\030 \003 \001 (\013 2\025 .google.ia"
177
- + "m.v1.Policy\022 M\n \013 explanation\030 \004 \001 (\013 28.googl"
178
- + "e.cloud.asset.v1.IamPolicySearchResult.E"
179
- + "xplanation\032 \241 \002 \n \013 Explanation\022 m\n \023 matched_pe"
180
- + "rmissions\030 \001 \003 (\013 2P.google.cloud.asset.v1."
181
- + "IamPolicySearchResult.Explanation.Matche"
182
- + "dPermissionsEntry\032 \" \n \013 Permissions\022 \023 \n \013 perm"
183
- + "issions\030 \001 \003 (\t \032 \177 \n \027 MatchedPermissionsEntry"
184
- + "\022 \013 \n \003 key\030 \001 \001 (\t \022 S\n \005 value\030 \002 \001 (\013 2D.google.cl"
185
- + "oud.asset.v1.IamPolicySearchResult.Expla"
186
- + "nation.Permissions:\002 8\001 \" G\n \026 IamPolicyAnaly"
187
- + "sisState\022 \036 \n \004 code\030 \001 \001 (\016 2\020 .google.rpc.Code"
188
- + "\022 \r \n \005 cause\030 \002 \001 (\t \" \306 \001 \n \023 ConditionEvaluation\022 "
189
- + "T\n \020 evaluation_value\030 \001 \001 (\016 2:.google.cloud"
190
- + ".asset.v1.ConditionEvaluation.Evaluation"
191
- + "Value\" Y\n \017 EvaluationValue\022 \n \034 EVALUATION_V"
192
- + "ALUE_UNSPECIFIED\020 \000 \022 \010 \n \004 TRUE\020 \001 \022 \t \n \005 FALSE\020 \002 \022 "
193
- + "\017 \n \013 CONDITIONAL\020 \003 \" \253 \t \n \027 IamPolicyAnalysisRe"
194
- + "sult\022 #\n \033 attached_resource_full_name\030 \001 \001 ("
195
- + "\t \022 +\n \013 iam_binding\030 \002 \001 (\013 2\026 .google.iam.v1.B"
196
- +
"inding\022 ^\n \024 access_control_lists\030 \003 \003 (\013 [email protected] "
197
- + "oogle.cloud.asset.v1.IamPolicyAnalysisRe"
198
- + "sult.AccessControlList\022 R\n \r identity_list\030 "
199
- + "\004 \001 (\013 2;.google.cloud.asset.v1.IamPolicyA"
200
- + "nalysisResult.IdentityList\022 \026 \n \016 fully_expl"
201
- + "ored\030 \005 \001 (\010 \032 m\n \010 Resource\022 \032 \n \022 full_resource_"
202
- + "name\030 \001 \001 (\t \022 E\n \016 analysis_state\030 \002 \001 (\013 2-.goo"
203
- + "gle.cloud.asset.v1.IamPolicyAnalysisStat"
204
- + "e\032 \205 \001 \n \006 Access\022 \016 \n \004 role\030 \001 \001 (\t H\000 \022 \024 \n \n permissi"
205
- + "on\030 \002 \001 (\t H\000 \022 E\n \016 analysis_state\030 \003 \001 (\013 2-.goo"
206
- + "gle.cloud.asset.v1.IamPolicyAnalysisStat"
207
- + "eB\016 \n \014 oneof_access\032 _\n \010 Identity\022 \014 \n \004 name\030 \001 "
208
- + "\001 (\t \022 E\n \016 analysis_state\030 \002 \001 (\013 2-.google.clo"
209
- + "ud.asset.v1.IamPolicyAnalysisState\032 0\n \004 Ed"
210
- + "ge\022 \023 \n \013 source_node\030 \001 \001 (\t \022 \023 \n \013 target_node\030 \002 "
211
- + " \001 (\t \032 \277 \002 \n \021 AccessControlList\022 J\n \t resources\030 "
212
- + "\001 \003 (\013 27.google.cloud.asset.v1.IamPolicyA"
213
- + "nalysisResult.Resource\022 G\n \010 accesses\030 \002 \003 (\013 "
214
- + "25.google.cloud.asset.v1.IamPolicyAnalys"
215
- + "isResult.Access\022 K\n \016 resource_edges\030 \003 \003 (\013 2"
216
- + "3.google.cloud.asset.v1.IamPolicyAnalysi"
217
- + "sResult.Edge\022 H\n \024 condition_evaluation\030 \004 \001 "
218
- + "(\013 2*.google.cloud.asset.v1.ConditionEval"
219
- + "uation\032 \245 \001 \n \014 IdentityList\022 K\n \n identities\030 \001 "
220
- + "\003 (\013 27.google.cloud.asset.v1.IamPolicyAna"
221
- + "lysisResult.Identity\022 H\n \013 group_edges\030 \002 \003 ("
222
- + "\013 23.google.cloud.asset.v1.IamPolicyAnaly"
223
- + "sisResult.EdgeB\230 \001 \n \031 com.google.cloud.asse"
224
- + "t.v1B\n AssetProtoP\001 Z:google.golang.org/ge"
225
- + "nproto/googleapis/cloud/asset/v1;asset\370 \001 "
226
- + "\001 \252 \002 \025 Google.Cloud.Asset.V1\312 \002 \025 Google\\ Cloud"
227
- + "\\ Asset\\ V1b\006 proto3"
174
+ + "\013 \n \003 key\030 \001 \001 (\t \022 \r \n \005 value\030 \002 \001 (\t :\002 8\001 \" \217 \004 \n \025 IamP"
175
+ + "olicySearchResult\022 \020 \n \010 resource\030 \001 \001 (\t \022 \022 \n \n a"
176
+ + "sset_type\030 \005 \001 (\t \022 \017 \n \007 project\030 \002 \001 (\t \022 \017 \n \007 fold"
177
+ + "ers\030 \006 \003 (\t \022 \024 \n \014 organization\030 \007 \001 (\t \022 %\n \006 polic"
178
+ + "y\030 \003 \001 (\013 2\025 .google.iam.v1.Policy\022 M\n \013 explan"
179
+ + "ation\030 \004 \001 (\013 28.google.cloud.asset.v1.IamP"
180
+ + "olicySearchResult.Explanation\032 \241 \002 \n \013 Explan"
181
+ + "ation\022 m\n \023 matched_permissions\030 \001 \003 (\013 2P.goo"
182
+ + "gle.cloud.asset.v1.IamPolicySearchResult"
183
+ + ".Explanation.MatchedPermissionsEntry\032 \" \n \013 "
184
+ + "Permissions\022 \023 \n \013 permissions\030 \001 \003 (\t \032 \177 \n \027 Matc"
185
+ + "hedPermissionsEntry\022 \013 \n \003 key\030 \001 \001 (\t \022 S\n \005 valu"
186
+ + "e\030 \002 \001 (\013 2D.google.cloud.asset.v1.IamPolic"
187
+ + "ySearchResult.Explanation.Permissions:\002 8"
188
+ + "\001 \" G\n \026 IamPolicyAnalysisState\022 \036 \n \004 code\030 \001 \001 ("
189
+ + "\016 2\020 .google.rpc.Code\022 \r \n \005 cause\030 \002 \001 (\t \" \306 \001 \n \023 C"
190
+ + "onditionEvaluation\022 T\n \020 evaluation_value\030 \001 "
191
+ + " \001 (\016 2:.google.cloud.asset.v1.ConditionEv"
192
+ + "aluation.EvaluationValue\" Y\n \017 EvaluationVa"
193
+ + "lue\022 \n \034 EVALUATION_VALUE_UNSPECIFIED\020 \000 \022 \010 \n "
194
+ + "\004 TRUE\020 \001 \022 \t \n \005 FALSE\020 \002 \022 \017 \n \013 CONDITIONAL\020 \003 \" \253 \t \n \027 "
195
+ + "IamPolicyAnalysisResult\022 #\n \033 attached_reso"
196
+ + "urce_full_name\030 \001 \001 (\t \022 +\n \013 iam_binding\030 \002 \001 ("
197
+ + "\013 2\026 .google.iam.v1.Binding\022 ^\n \024 access_cont"
198
+ +
"rol_lists\030 \003 \003 (\013 [email protected] ."
199
+ + "IamPolicyAnalysisResult.AccessControlLis"
200
+ + "t\022 R\n \r identity_list\030 \004 \001 (\013 2;.google.cloud."
201
+ + "asset.v1.IamPolicyAnalysisResult.Identit"
202
+ + "yList\022 \026 \n \016 fully_explored\030 \005 \001 (\010 \032 m\n \010 Resourc"
203
+ + "e\022 \032 \n \022 full_resource_name\030 \001 \001 (\t \022 E\n \016 analysi"
204
+ + "s_state\030 \002 \001 (\013 2-.google.cloud.asset.v1.Ia"
205
+ + "mPolicyAnalysisState\032 \205 \001 \n \006 Access\022 \016 \n \004 role\030 "
206
+ + "\001 \001 (\t H\000 \022 \024 \n \n permission\030 \002 \001 (\t H\000 \022 E\n \016 analysi"
207
+ + "s_state\030 \003 \001 (\013 2-.google.cloud.asset.v1.Ia"
208
+ + "mPolicyAnalysisStateB\016 \n \014 oneof_access\032 _\n \010 "
209
+ + "Identity\022 \014 \n \004 name\030 \001 \001 (\t \022 E\n \016 analysis_state"
210
+ + "\030 \002 \001 (\013 2-.google.cloud.asset.v1.IamPolicy"
211
+ + "AnalysisState\032 0\n \004 Edge\022 \023 \n \013 source_node\030 \001 \001 "
212
+ + "(\t \022 \023 \n \013 target_node\030 \002 \001 (\t \032 \277 \002 \n \021 AccessContro"
213
+ + "lList\022 J\n \t resources\030 \001 \003 (\013 27.google.cloud."
214
+ + "asset.v1.IamPolicyAnalysisResult.Resourc"
215
+ + "e\022 G\n \010 accesses\030 \002 \003 (\013 25.google.cloud.asset"
216
+ + ".v1.IamPolicyAnalysisResult.Access\022 K\n \016 re"
217
+ + "source_edges\030 \003 \003 (\013 23.google.cloud.asset."
218
+ + "v1.IamPolicyAnalysisResult.Edge\022 H\n \024 condi"
219
+ + "tion_evaluation\030 \004 \001 (\013 2*.google.cloud.ass"
220
+ + "et.v1.ConditionEvaluation\032 \245 \001 \n \014 IdentityLi"
221
+ + "st\022 K\n \n identities\030 \001 \003 (\013 27.google.cloud.as"
222
+ + "set.v1.IamPolicyAnalysisResult.Identity\022 "
223
+ + "H\n \013 group_edges\030 \002 \003 (\013 23.google.cloud.asse"
224
+ + "t.v1.IamPolicyAnalysisResult.EdgeB\230 \001 \n \031 co"
225
+ + "m.google.cloud.asset.v1B\n AssetProtoP\001 Z:g"
226
+ + "oogle.golang.org/genproto/googleapis/clo"
227
+ + "ud/asset/v1;asset\370 \001 \001 \252 \002 \025 Google.Cloud.Asse"
228
+ + "t.V1\312 \002 \025 Google\\ Cloud\\ Asset\\ V1b\006 proto3"
228
229
};
229
230
descriptor =
230
231
com .google .protobuf .Descriptors .FileDescriptor .internalBuildGeneratedFileFrom (
@@ -332,7 +333,13 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
332
333
new com .google .protobuf .GeneratedMessageV3 .FieldAccessorTable (
333
334
internal_static_google_cloud_asset_v1_IamPolicySearchResult_descriptor ,
334
335
new java .lang .String [] {
335
- "Resource" , "Project" , "Policy" , "Explanation" ,
336
+ "Resource" ,
337
+ "AssetType" ,
338
+ "Project" ,
339
+ "Folders" ,
340
+ "Organization" ,
341
+ "Policy" ,
342
+ "Explanation" ,
336
343
});
337
344
internal_static_google_cloud_asset_v1_IamPolicySearchResult_Explanation_descriptor =
338
345
internal_static_google_cloud_asset_v1_IamPolicySearchResult_descriptor
0 commit comments