@@ -171,60 +171,61 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
171171 + "_attributes\030 \t \001 (\013 2\027 .google.protobuf.Stru"
172172 + "ct\022 !\n \031 parent_full_resource_name\030 \023 \001 (\t \022 \031 \n "
173173 + "\021 parent_asset_type\030 g \001 (\t \032 -\n \013 LabelsEntry\022 "
174- + "\013 \n \003 key\030 \001 \001 (\t \022 \r \n \005 value\030 \002 \001 (\t :\002 8\001 \" \324 \003 \n \025 IamP"
175- + "olicySearchResult\022 \020 \n \010 resource\030 \001 \001 (\t \022 \017 \n \007 p"
176- + "roject\030 \002 \001 (\t \022 %\n \006 policy\030 \003 \001 (\013 2\025 .google.ia"
177- + "m.v1.Policy\022 M\n \013 explanation\030 \004 \001 (\013 28.googl"
178- + "e.cloud.asset.v1.IamPolicySearchResult.E"
179- + "xplanation\032 \241 \002 \n \013 Explanation\022 m\n \023 matched_pe"
180- + "rmissions\030 \001 \003 (\013 2P.google.cloud.asset.v1."
181- + "IamPolicySearchResult.Explanation.Matche"
182- + "dPermissionsEntry\032 \" \n \013 Permissions\022 \023 \n \013 perm"
183- + "issions\030 \001 \003 (\t \032 \177 \n \027 MatchedPermissionsEntry"
184- + "\022 \013 \n \003 key\030 \001 \001 (\t \022 S\n \005 value\030 \002 \001 (\013 2D.google.cl"
185- + "oud.asset.v1.IamPolicySearchResult.Expla"
186- + "nation.Permissions:\002 8\001 \" G\n \026 IamPolicyAnaly"
187- + "sisState\022 \036 \n \004 code\030 \001 \001 (\016 2\020 .google.rpc.Code"
188- + "\022 \r \n \005 cause\030 \002 \001 (\t \" \306 \001 \n \023 ConditionEvaluation\022 "
189- + "T\n \020 evaluation_value\030 \001 \001 (\016 2:.google.cloud"
190- + ".asset.v1.ConditionEvaluation.Evaluation"
191- + "Value\" Y\n \017 EvaluationValue\022 \n \034 EVALUATION_V"
192- + "ALUE_UNSPECIFIED\020 \000 \022 \010 \n \004 TRUE\020 \001 \022 \t \n \005 FALSE\020 \002 \022 "
193- + "\017 \n \013 CONDITIONAL\020 \003 \" \253 \t \n \027 IamPolicyAnalysisRe"
194- + "sult\022 #\n \033 attached_resource_full_name\030 \001 \001 ("
195- + "\t \022 +\n \013 iam_binding\030 \002 \001 (\013 2\026 .google.iam.v1.B"
196- +
"inding\022 ^\n \024 access_control_lists\030 \003 \003 (\013 [email protected] " 197- + "oogle.cloud.asset.v1.IamPolicyAnalysisRe"
198- + "sult.AccessControlList\022 R\n \r identity_list\030 "
199- + "\004 \001 (\013 2;.google.cloud.asset.v1.IamPolicyA"
200- + "nalysisResult.IdentityList\022 \026 \n \016 fully_expl"
201- + "ored\030 \005 \001 (\010 \032 m\n \010 Resource\022 \032 \n \022 full_resource_"
202- + "name\030 \001 \001 (\t \022 E\n \016 analysis_state\030 \002 \001 (\013 2-.goo"
203- + "gle.cloud.asset.v1.IamPolicyAnalysisStat"
204- + "e\032 \205 \001 \n \006 Access\022 \016 \n \004 role\030 \001 \001 (\t H\000 \022 \024 \n \n permissi"
205- + "on\030 \002 \001 (\t H\000 \022 E\n \016 analysis_state\030 \003 \001 (\013 2-.goo"
206- + "gle.cloud.asset.v1.IamPolicyAnalysisStat"
207- + "eB\016 \n \014 oneof_access\032 _\n \010 Identity\022 \014 \n \004 name\030 \001 "
208- + "\001 (\t \022 E\n \016 analysis_state\030 \002 \001 (\013 2-.google.clo"
209- + "ud.asset.v1.IamPolicyAnalysisState\032 0\n \004 Ed"
210- + "ge\022 \023 \n \013 source_node\030 \001 \001 (\t \022 \023 \n \013 target_node\030 \002 "
211- + " \001 (\t \032 \277 \002 \n \021 AccessControlList\022 J\n \t resources\030 "
212- + "\001 \003 (\013 27.google.cloud.asset.v1.IamPolicyA"
213- + "nalysisResult.Resource\022 G\n \010 accesses\030 \002 \003 (\013 "
214- + "25.google.cloud.asset.v1.IamPolicyAnalys"
215- + "isResult.Access\022 K\n \016 resource_edges\030 \003 \003 (\013 2"
216- + "3.google.cloud.asset.v1.IamPolicyAnalysi"
217- + "sResult.Edge\022 H\n \024 condition_evaluation\030 \004 \001 "
218- + "(\013 2*.google.cloud.asset.v1.ConditionEval"
219- + "uation\032 \245 \001 \n \014 IdentityList\022 K\n \n identities\030 \001 "
220- + "\003 (\013 27.google.cloud.asset.v1.IamPolicyAna"
221- + "lysisResult.Identity\022 H\n \013 group_edges\030 \002 \003 ("
222- + "\013 23.google.cloud.asset.v1.IamPolicyAnaly"
223- + "sisResult.EdgeB\230 \001 \n \031 com.google.cloud.asse"
224- + "t.v1B\n AssetProtoP\001 Z:google.golang.org/ge"
225- + "nproto/googleapis/cloud/asset/v1;asset\370 \001 "
226- + "\001 \252 \002 \025 Google.Cloud.Asset.V1\312 \002 \025 Google\\ Cloud"
227- + "\\ Asset\\ V1b\006 proto3"
174+ + "\013 \n \003 key\030 \001 \001 (\t \022 \r \n \005 value\030 \002 \001 (\t :\002 8\001 \" \217 \004 \n \025 IamP"
175+ + "olicySearchResult\022 \020 \n \010 resource\030 \001 \001 (\t \022 \022 \n \n a"
176+ + "sset_type\030 \005 \001 (\t \022 \017 \n \007 project\030 \002 \001 (\t \022 \017 \n \007 fold"
177+ + "ers\030 \006 \003 (\t \022 \024 \n \014 organization\030 \007 \001 (\t \022 %\n \006 polic"
178+ + "y\030 \003 \001 (\013 2\025 .google.iam.v1.Policy\022 M\n \013 explan"
179+ + "ation\030 \004 \001 (\013 28.google.cloud.asset.v1.IamP"
180+ + "olicySearchResult.Explanation\032 \241 \002 \n \013 Explan"
181+ + "ation\022 m\n \023 matched_permissions\030 \001 \003 (\013 2P.goo"
182+ + "gle.cloud.asset.v1.IamPolicySearchResult"
183+ + ".Explanation.MatchedPermissionsEntry\032 \" \n \013 "
184+ + "Permissions\022 \023 \n \013 permissions\030 \001 \003 (\t \032 \177 \n \027 Matc"
185+ + "hedPermissionsEntry\022 \013 \n \003 key\030 \001 \001 (\t \022 S\n \005 valu"
186+ + "e\030 \002 \001 (\013 2D.google.cloud.asset.v1.IamPolic"
187+ + "ySearchResult.Explanation.Permissions:\002 8"
188+ + "\001 \" G\n \026 IamPolicyAnalysisState\022 \036 \n \004 code\030 \001 \001 ("
189+ + "\016 2\020 .google.rpc.Code\022 \r \n \005 cause\030 \002 \001 (\t \" \306 \001 \n \023 C"
190+ + "onditionEvaluation\022 T\n \020 evaluation_value\030 \001 "
191+ + " \001 (\016 2:.google.cloud.asset.v1.ConditionEv"
192+ + "aluation.EvaluationValue\" Y\n \017 EvaluationVa"
193+ + "lue\022 \n \034 EVALUATION_VALUE_UNSPECIFIED\020 \000 \022 \010 \n "
194+ + "\004 TRUE\020 \001 \022 \t \n \005 FALSE\020 \002 \022 \017 \n \013 CONDITIONAL\020 \003 \" \253 \t \n \027 "
195+ + "IamPolicyAnalysisResult\022 #\n \033 attached_reso"
196+ + "urce_full_name\030 \001 \001 (\t \022 +\n \013 iam_binding\030 \002 \001 ("
197+ + "\013 2\026 .google.iam.v1.Binding\022 ^\n \024 access_cont"
198+ +
"rol_lists\030 \003 \003 (\013 [email protected] ." 199+ + "IamPolicyAnalysisResult.AccessControlLis"
200+ + "t\022 R\n \r identity_list\030 \004 \001 (\013 2;.google.cloud."
201+ + "asset.v1.IamPolicyAnalysisResult.Identit"
202+ + "yList\022 \026 \n \016 fully_explored\030 \005 \001 (\010 \032 m\n \010 Resourc"
203+ + "e\022 \032 \n \022 full_resource_name\030 \001 \001 (\t \022 E\n \016 analysi"
204+ + "s_state\030 \002 \001 (\013 2-.google.cloud.asset.v1.Ia"
205+ + "mPolicyAnalysisState\032 \205 \001 \n \006 Access\022 \016 \n \004 role\030 "
206+ + "\001 \001 (\t H\000 \022 \024 \n \n permission\030 \002 \001 (\t H\000 \022 E\n \016 analysi"
207+ + "s_state\030 \003 \001 (\013 2-.google.cloud.asset.v1.Ia"
208+ + "mPolicyAnalysisStateB\016 \n \014 oneof_access\032 _\n \010 "
209+ + "Identity\022 \014 \n \004 name\030 \001 \001 (\t \022 E\n \016 analysis_state"
210+ + "\030 \002 \001 (\013 2-.google.cloud.asset.v1.IamPolicy"
211+ + "AnalysisState\032 0\n \004 Edge\022 \023 \n \013 source_node\030 \001 \001 "
212+ + "(\t \022 \023 \n \013 target_node\030 \002 \001 (\t \032 \277 \002 \n \021 AccessContro"
213+ + "lList\022 J\n \t resources\030 \001 \003 (\013 27.google.cloud."
214+ + "asset.v1.IamPolicyAnalysisResult.Resourc"
215+ + "e\022 G\n \010 accesses\030 \002 \003 (\013 25.google.cloud.asset"
216+ + ".v1.IamPolicyAnalysisResult.Access\022 K\n \016 re"
217+ + "source_edges\030 \003 \003 (\013 23.google.cloud.asset."
218+ + "v1.IamPolicyAnalysisResult.Edge\022 H\n \024 condi"
219+ + "tion_evaluation\030 \004 \001 (\013 2*.google.cloud.ass"
220+ + "et.v1.ConditionEvaluation\032 \245 \001 \n \014 IdentityLi"
221+ + "st\022 K\n \n identities\030 \001 \003 (\013 27.google.cloud.as"
222+ + "set.v1.IamPolicyAnalysisResult.Identity\022 "
223+ + "H\n \013 group_edges\030 \002 \003 (\013 23.google.cloud.asse"
224+ + "t.v1.IamPolicyAnalysisResult.EdgeB\230 \001 \n \031 co"
225+ + "m.google.cloud.asset.v1B\n AssetProtoP\001 Z:g"
226+ + "oogle.golang.org/genproto/googleapis/clo"
227+ + "ud/asset/v1;asset\370 \001 \001 \252 \002 \025 Google.Cloud.Asse"
228+ + "t.V1\312 \002 \025 Google\\ Cloud\\ Asset\\ V1b\006 proto3"
228229 };
229230 descriptor =
230231 com .google .protobuf .Descriptors .FileDescriptor .internalBuildGeneratedFileFrom (
@@ -332,7 +333,13 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
332333 new com .google .protobuf .GeneratedMessageV3 .FieldAccessorTable (
333334 internal_static_google_cloud_asset_v1_IamPolicySearchResult_descriptor ,
334335 new java .lang .String [] {
335- "Resource" , "Project" , "Policy" , "Explanation" ,
336+ "Resource" ,
337+ "AssetType" ,
338+ "Project" ,
339+ "Folders" ,
340+ "Organization" ,
341+ "Policy" ,
342+ "Explanation" ,
336343 });
337344 internal_static_google_cloud_asset_v1_IamPolicySearchResult_Explanation_descriptor =
338345 internal_static_google_cloud_asset_v1_IamPolicySearchResult_descriptor
0 commit comments