# frozen_string_literal: true # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/cloud/policytroubleshooter/iam/v3/troubleshooter.proto require 'google/protobuf' require 'google/api/annotations_pb' require 'google/api/client_pb' require 'google/api/field_behavior_pb' require 'google/iam/v1/policy_pb' require 'google/iam/v2/policy_pb' require 'google/protobuf/struct_pb' require 'google/protobuf/timestamp_pb' require 'google/rpc/status_pb' require 'google/type/expr_pb' descriptor_data = "\n=google/cloud/policytroubleshooter/iam/v3/troubleshooter.proto\x12(google.cloud.policytroubleshooter.iam.v3\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1agoogle/iam/v2/policy.proto\x1a\x1cgoogle/protobuf/struct.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\x1a\x16google/type/expr.proto\"k\n\x1cTroubleshootIamPolicyRequest\x12K\n\x0c\x61\x63\x63\x65ss_tuple\x18\x01 \x01(\x0b\x32\x35.google.cloud.policytroubleshooter.iam.v3.AccessTuple\"\xb7\x04\n\x1dTroubleshootIamPolicyResponse\x12x\n\x14overall_access_state\x18\x01 \x01(\x0e\x32Z.google.cloud.policytroubleshooter.iam.v3.TroubleshootIamPolicyResponse.OverallAccessState\x12K\n\x0c\x61\x63\x63\x65ss_tuple\x18\x02 \x01(\x0b\x32\x35.google.cloud.policytroubleshooter.iam.v3.AccessTuple\x12\x62\n\x18\x61llow_policy_explanation\x18\x03 \x01(\x0b\x32@.google.cloud.policytroubleshooter.iam.v3.AllowPolicyExplanation\x12`\n\x17\x64\x65ny_policy_explanation\x18\x04 \x01(\x0b\x32?.google.cloud.policytroubleshooter.iam.v3.DenyPolicyExplanation\"\x88\x01\n\x12OverallAccessState\x12$\n OVERALL_ACCESS_STATE_UNSPECIFIED\x10\x00\x12\x0e\n\nCAN_ACCESS\x10\x01\x12\x11\n\rCANNOT_ACCESS\x10\x02\x12\x10\n\x0cUNKNOWN_INFO\x10\x03\x12\x17\n\x13UNKNOWN_CONDITIONAL\x10\x04\"\xd9\x01\n\x0b\x41\x63\x63\x65ssTuple\x12\x16\n\tprincipal\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x1f\n\x12\x66ull_resource_name\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x17\n\npermission\x18\x03 \x01(\tB\x03\xe0\x41\x02\x12\x1c\n\x0fpermission_fqdn\x18\x04 \x01(\tB\x03\xe0\x41\x03\x12Z\n\x11\x63ondition_context\x18\x05 \x01(\x0b\x32:.google.cloud.policytroubleshooter.iam.v3.ConditionContextB\x03\xe0\x41\x01\"\xcf\x05\n\x10\x43onditionContext\x12U\n\x08resource\x18\x01 \x01(\x0b\x32\x43.google.cloud.policytroubleshooter.iam.v3.ConditionContext.Resource\x12T\n\x0b\x64\x65stination\x18\x02 \x01(\x0b\x32?.google.cloud.policytroubleshooter.iam.v3.ConditionContext.Peer\x12S\n\x07request\x18\x03 \x01(\x0b\x32\x42.google.cloud.policytroubleshooter.iam.v3.ConditionContext.Request\x12\x64\n\x0e\x65\x66\x66\x65\x63tive_tags\x18\x04 \x03(\x0b\x32G.google.cloud.policytroubleshooter.iam.v3.ConditionContext.EffectiveTagB\x03\xe0\x41\x03\x1a\x37\n\x08Resource\x12\x0f\n\x07service\x18\x01 \x01(\t\x12\x0c\n\x04name\x18\x02 \x01(\t\x12\x0c\n\x04type\x18\x03 \x01(\t\x1a \n\x04Peer\x12\n\n\x02ip\x18\x01 \x01(\t\x12\x0c\n\x04port\x18\x02 \x01(\x03\x1a@\n\x07Request\x12\x35\n\x0creceive_time\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x01\x1a\xb5\x01\n\x0c\x45\x66\x66\x65\x63tiveTag\x12\x16\n\ttag_value\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12!\n\x14namespaced_tag_value\x18\x02 \x01(\tB\x03\xe0\x41\x03\x12\x14\n\x07tag_key\x18\x03 \x01(\tB\x03\xe0\x41\x03\x12\x1f\n\x12namespaced_tag_key\x18\x04 \x01(\tB\x03\xe0\x41\x03\x12\x1b\n\x13tag_key_parent_name\x18\x06 \x01(\t\x12\x16\n\tinherited\x18\x05 \x01(\x08\x42\x03\xe0\x41\x03\"\x9d\x02\n\x16\x41llowPolicyExplanation\x12V\n\x12\x61llow_access_state\x18\x01 \x01(\x0e\x32:.google.cloud.policytroubleshooter.iam.v3.AllowAccessState\x12Z\n\x12\x65xplained_policies\x18\x02 \x03(\x0b\x32>.google.cloud.policytroubleshooter.iam.v3.ExplainedAllowPolicy\x12O\n\trelevance\x18\x03 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\"\xe8\x02\n\x14\x45xplainedAllowPolicy\x12[\n\x12\x61llow_access_state\x18\x01 \x01(\x0e\x32:.google.cloud.policytroubleshooter.iam.v3.AllowAccessStateB\x03\xe0\x41\x02\x12\x1a\n\x12\x66ull_resource_name\x18\x02 \x01(\t\x12_\n\x14\x62inding_explanations\x18\x03 \x03(\x0b\x32\x41.google.cloud.policytroubleshooter.iam.v3.AllowBindingExplanation\x12O\n\trelevance\x18\x04 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\x12%\n\x06policy\x18\x05 \x01(\x0b\x32\x15.google.iam.v1.Policy\"\xd4\x08\n\x17\x41llowBindingExplanation\x12[\n\x12\x61llow_access_state\x18\x01 \x01(\x0e\x32:.google.cloud.policytroubleshooter.iam.v3.AllowAccessStateB\x03\xe0\x41\x02\x12\x0c\n\x04role\x18\x02 \x01(\t\x12_\n\x0frole_permission\x18\x03 \x01(\x0e\x32\x46.google.cloud.policytroubleshooter.iam.v3.RolePermissionInclusionState\x12_\n\x19role_permission_relevance\x18\x04 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\x12w\n\x13\x63ombined_membership\x18\x05 \x01(\x0b\x32Z.google.cloud.policytroubleshooter.iam.v3.AllowBindingExplanation.AnnotatedAllowMembership\x12g\n\x0bmemberships\x18\x06 \x03(\x0b\x32R.google.cloud.policytroubleshooter.iam.v3.AllowBindingExplanation.MembershipsEntry\x12O\n\trelevance\x18\x07 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\x12$\n\tcondition\x18\x08 \x01(\x0b\x32\x11.google.type.Expr\x12]\n\x15\x63ondition_explanation\x18\t \x01(\x0b\x32>.google.cloud.policytroubleshooter.iam.v3.ConditionExplanation\x1a\xc2\x01\n\x18\x41nnotatedAllowMembership\x12U\n\nmembership\x18\x01 \x01(\x0e\x32\x41.google.cloud.policytroubleshooter.iam.v3.MembershipMatchingState\x12O\n\trelevance\x18\x02 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\x1a\x8e\x01\n\x10MembershipsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12i\n\x05value\x18\x02 \x01(\x0b\x32Z.google.cloud.policytroubleshooter.iam.v3.AllowBindingExplanation.AnnotatedAllowMembership:\x02\x38\x01\"\xb9\x02\n\x15\x44\x65nyPolicyExplanation\x12T\n\x11\x64\x65ny_access_state\x18\x01 \x01(\x0e\x32\x39.google.cloud.policytroubleshooter.iam.v3.DenyAccessState\x12\\\n\x13\x65xplained_resources\x18\x02 \x03(\x0b\x32?.google.cloud.policytroubleshooter.iam.v3.ExplainedDenyResource\x12O\n\trelevance\x18\x03 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\x12\x1b\n\x13permission_deniable\x18\x04 \x01(\x08\"\xba\x02\n\x15\x45xplainedDenyResource\x12Y\n\x11\x64\x65ny_access_state\x18\x01 \x01(\x0e\x32\x39.google.cloud.policytroubleshooter.iam.v3.DenyAccessStateB\x03\xe0\x41\x02\x12\x1a\n\x12\x66ull_resource_name\x18\x02 \x01(\t\x12Y\n\x12\x65xplained_policies\x18\x03 \x03(\x0b\x32=.google.cloud.policytroubleshooter.iam.v3.ExplainedDenyPolicy\x12O\n\trelevance\x18\x04 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\"\xc2\x02\n\x13\x45xplainedDenyPolicy\x12Y\n\x11\x64\x65ny_access_state\x18\x01 \x01(\x0e\x32\x39.google.cloud.policytroubleshooter.iam.v3.DenyAccessStateB\x03\xe0\x41\x02\x12%\n\x06policy\x18\x02 \x01(\x0b\x32\x15.google.iam.v2.Policy\x12X\n\x11rule_explanations\x18\x03 \x03(\x0b\x32=.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation\x12O\n\trelevance\x18\x04 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\"\xa9\x12\n\x13\x44\x65nyRuleExplanation\x12Y\n\x11\x64\x65ny_access_state\x18\x01 \x01(\x0e\x32\x39.google.cloud.policytroubleshooter.iam.v3.DenyAccessStateB\x03\xe0\x41\x02\x12}\n\x1a\x63ombined_denied_permission\x18\x02 \x01(\x0b\x32Y.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedPermissionMatching\x12p\n\x12\x64\x65nied_permissions\x18\x03 \x03(\x0b\x32T.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.DeniedPermissionsEntry\x12\x80\x01\n\x1d\x63ombined_exception_permission\x18\x04 \x01(\x0b\x32Y.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedPermissionMatching\x12v\n\x15\x65xception_permissions\x18\x05 \x03(\x0b\x32W.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.ExceptionPermissionsEntry\x12\x7f\n\x19\x63ombined_denied_principal\x18\x06 \x01(\x0b\x32\\.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedDenyPrincipalMatching\x12n\n\x11\x64\x65nied_principals\x18\x07 \x03(\x0b\x32S.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.DeniedPrincipalsEntry\x12\x82\x01\n\x1c\x63ombined_exception_principal\x18\x08 \x01(\x0b\x32\\.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedDenyPrincipalMatching\x12t\n\x14\x65xception_principals\x18\t \x03(\x0b\x32V.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.ExceptionPrincipalsEntry\x12O\n\trelevance\x18\n \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\x12$\n\tcondition\x18\x0b \x01(\x0b\x32\x11.google.type.Expr\x12]\n\x15\x63ondition_explanation\x18\x0c \x01(\x0b\x32>.google.cloud.policytroubleshooter.iam.v3.ConditionExplanation\x1a\xdb\x01\n\x1b\x41nnotatedPermissionMatching\x12k\n\x19permission_matching_state\x18\x01 \x01(\x0e\x32H.google.cloud.policytroubleshooter.iam.v3.PermissionPatternMatchingState\x12O\n\trelevance\x18\x02 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\x1a\xc8\x01\n\x1e\x41nnotatedDenyPrincipalMatching\x12U\n\nmembership\x18\x01 \x01(\x0e\x32\x41.google.cloud.policytroubleshooter.iam.v3.MembershipMatchingState\x12O\n\trelevance\x18\x02 \x01(\x0e\x32<.google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance\x1a\x93\x01\n\x16\x44\x65niedPermissionsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12h\n\x05value\x18\x02 \x01(\x0b\x32Y.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedPermissionMatching:\x02\x38\x01\x1a\x96\x01\n\x19\x45xceptionPermissionsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12h\n\x05value\x18\x02 \x01(\x0b\x32Y.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedPermissionMatching:\x02\x38\x01\x1a\x95\x01\n\x15\x44\x65niedPrincipalsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12k\n\x05value\x18\x02 \x01(\x0b\x32\\.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedDenyPrincipalMatching:\x02\x38\x01\x1a\x98\x01\n\x18\x45xceptionPrincipalsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12k\n\x05value\x18\x02 \x01(\x0b\x32\\.google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedDenyPrincipalMatching:\x02\x38\x01\"\xc6\x02\n\x14\x43onditionExplanation\x12%\n\x05value\x18\x01 \x01(\x0b\x32\x16.google.protobuf.Value\x12\"\n\x06\x65rrors\x18\x03 \x03(\x0b\x32\x12.google.rpc.Status\x12i\n\x11\x65valuation_states\x18\x02 \x03(\x0b\x32N.google.cloud.policytroubleshooter.iam.v3.ConditionExplanation.EvaluationState\x1ax\n\x0f\x45valuationState\x12\r\n\x05start\x18\x01 \x01(\x05\x12\x0b\n\x03\x65nd\x18\x02 \x01(\x05\x12%\n\x05value\x18\x03 \x01(\x0b\x32\x16.google.protobuf.Value\x12\"\n\x06\x65rrors\x18\x04 \x03(\x0b\x32\x12.google.rpc.Status*\xcb\x01\n\x10\x41llowAccessState\x12\"\n\x1e\x41LLOW_ACCESS_STATE_UNSPECIFIED\x10\x00\x12\x1e\n\x1a\x41LLOW_ACCESS_STATE_GRANTED\x10\x01\x12\"\n\x1e\x41LLOW_ACCESS_STATE_NOT_GRANTED\x10\x02\x12*\n&ALLOW_ACCESS_STATE_UNKNOWN_CONDITIONAL\x10\x03\x12#\n\x1f\x41LLOW_ACCESS_STATE_UNKNOWN_INFO\x10\x04*\xc3\x01\n\x0f\x44\x65nyAccessState\x12!\n\x1d\x44\x45NY_ACCESS_STATE_UNSPECIFIED\x10\x00\x12\x1c\n\x18\x44\x45NY_ACCESS_STATE_DENIED\x10\x01\x12 \n\x1c\x44\x45NY_ACCESS_STATE_NOT_DENIED\x10\x02\x12)\n%DENY_ACCESS_STATE_UNKNOWN_CONDITIONAL\x10\x03\x12\"\n\x1e\x44\x45NY_ACCESS_STATE_UNKNOWN_INFO\x10\x04*\xb1\x01\n\x1cRolePermissionInclusionState\x12/\n+ROLE_PERMISSION_INCLUSION_STATE_UNSPECIFIED\x10\x00\x12\x1c\n\x18ROLE_PERMISSION_INCLUDED\x10\x01\x12 \n\x1cROLE_PERMISSION_NOT_INCLUDED\x10\x02\x12 \n\x1cROLE_PERMISSION_UNKNOWN_INFO\x10\x03*\x97\x01\n\x1ePermissionPatternMatchingState\x12\x31\n-PERMISSION_PATTERN_MATCHING_STATE_UNSPECIFIED\x10\x00\x12\x1e\n\x1aPERMISSION_PATTERN_MATCHED\x10\x01\x12\"\n\x1ePERMISSION_PATTERN_NOT_MATCHED\x10\x02*\xb9\x01\n\x17MembershipMatchingState\x12)\n%MEMBERSHIP_MATCHING_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12MEMBERSHIP_MATCHED\x10\x01\x12\x1a\n\x16MEMBERSHIP_NOT_MATCHED\x10\x02\x12\x1b\n\x17MEMBERSHIP_UNKNOWN_INFO\x10\x03\x12\"\n\x1eMEMBERSHIP_UNKNOWN_UNSUPPORTED\x10\x04*w\n\x12HeuristicRelevance\x12#\n\x1fHEURISTIC_RELEVANCE_UNSPECIFIED\x10\x00\x12\x1e\n\x1aHEURISTIC_RELEVANCE_NORMAL\x10\x01\x12\x1c\n\x18HEURISTIC_RELEVANCE_HIGH\x10\x02\x32\xbb\x02\n\x14PolicyTroubleshooter\x12\xc9\x01\n\x15TroubleshootIamPolicy\x12\x46.google.cloud.policytroubleshooter.iam.v3.TroubleshootIamPolicyRequest\x1aG.google.cloud.policytroubleshooter.iam.v3.TroubleshootIamPolicyResponse\"\x1f\x82\xd3\xe4\x93\x02\x19\"\x14/v3/iam:troubleshoot:\x01*\x1aW\xca\x41#policytroubleshooter.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x8d\x02\n,com.google.cloud.policytroubleshooter.iam.v3B\x13TroubleshooterProtoP\x01Z>cloud.google.com/go/policytroubleshooter/iam/apiv3/iampb;iampb\xf8\x01\x01\xaa\x02(Google.Cloud.PolicyTroubleshooter.Iam.V3\xca\x02(Google\\Cloud\\PolicyTroubleshooter\\Iam\\V3\xea\x02,Google::Cloud::PolicyTroubleshooter::Iam::V3b\x06proto3" pool = Google::Protobuf::DescriptorPool.generated_pool begin pool.add_serialized_file(descriptor_data) rescue TypeError => e # Compatibility code: will be removed in the next major version. require 'google/protobuf/descriptor_pb' parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data) parsed.clear_dependency serialized = parsed.class.encode(parsed) file = pool.add_serialized_file(serialized) warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}" imports = [ ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"], ["google.iam.v1.Policy", "google/iam/v1/policy.proto"], ["google.type.Expr", "google/type/expr.proto"], ["google.iam.v2.Policy", "google/iam/v2/policy.proto"], ["google.protobuf.Value", "google/protobuf/struct.proto"], ["google.rpc.Status", "google/rpc/status.proto"], ] imports.each do |type_name, expected_filename| import_file = pool.lookup(type_name).file_descriptor if import_file.name != expected_filename warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}" end end warn "Each proto file must use a consistent fully-qualified name." warn "This will become an error in the next major version." end module Google module Cloud module PolicyTroubleshooter module Iam module V3 TroubleshootIamPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.TroubleshootIamPolicyRequest").msgclass TroubleshootIamPolicyResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.TroubleshootIamPolicyResponse").msgclass TroubleshootIamPolicyResponse::OverallAccessState = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.TroubleshootIamPolicyResponse.OverallAccessState").enummodule AccessTuple = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.AccessTuple").msgclass ConditionContext = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ConditionContext").msgclass ConditionContext::Resource = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ConditionContext.Resource").msgclass ConditionContext::Peer = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ConditionContext.Peer").msgclass ConditionContext::Request = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ConditionContext.Request").msgclass ConditionContext::EffectiveTag = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ConditionContext.EffectiveTag").msgclass AllowPolicyExplanation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.AllowPolicyExplanation").msgclass ExplainedAllowPolicy = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ExplainedAllowPolicy").msgclass AllowBindingExplanation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.AllowBindingExplanation").msgclass AllowBindingExplanation::AnnotatedAllowMembership = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.AllowBindingExplanation.AnnotatedAllowMembership").msgclass DenyPolicyExplanation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.DenyPolicyExplanation").msgclass ExplainedDenyResource = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ExplainedDenyResource").msgclass ExplainedDenyPolicy = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ExplainedDenyPolicy").msgclass DenyRuleExplanation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation").msgclass DenyRuleExplanation::AnnotatedPermissionMatching = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedPermissionMatching").msgclass DenyRuleExplanation::AnnotatedDenyPrincipalMatching = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.DenyRuleExplanation.AnnotatedDenyPrincipalMatching").msgclass ConditionExplanation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ConditionExplanation").msgclass ConditionExplanation::EvaluationState = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.ConditionExplanation.EvaluationState").msgclass AllowAccessState = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.AllowAccessState").enummodule DenyAccessState = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.DenyAccessState").enummodule RolePermissionInclusionState = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.RolePermissionInclusionState").enummodule PermissionPatternMatchingState = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.PermissionPatternMatchingState").enummodule MembershipMatchingState = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.MembershipMatchingState").enummodule HeuristicRelevance = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.policytroubleshooter.iam.v3.HeuristicRelevance").enummodule end end end end end