1// Code generated by protoc-gen-go. DO NOT EDIT.
2// source: google/cloud/orgpolicy/v1/orgpolicy.proto
3
4package orgpolicy
5
6import (
7	fmt "fmt"
8	math "math"
9
10	proto "github.com/golang/protobuf/proto"
11	_ "github.com/golang/protobuf/ptypes/empty"
12	timestamp "github.com/golang/protobuf/ptypes/timestamp"
13	_ "google.golang.org/genproto/googleapis/api/annotations"
14)
15
16// Reference imports to suppress errors if they are not otherwise used.
17var _ = proto.Marshal
18var _ = fmt.Errorf
19var _ = math.Inf
20
21// This is a compile-time assertion to ensure that this generated file
22// is compatible with the proto package it is being compiled against.
23// A compilation error at this line likely means your copy of the
24// proto package needs to be updated.
25const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package
26
27// This enum can be used to set `Policies` that apply to all possible
28// configuration values rather than specific values in `allowed_values` or
29// `denied_values`.
30//
31// Settting this to `ALLOW` will mean this `Policy` allows all values.
32// Similarly, setting it to `DENY` will mean no values are allowed. If
33// set to either `ALLOW` or `DENY,  `allowed_values` and `denied_values`
34// must be unset. Setting this to `ALL_VALUES_UNSPECIFIED` allows for
35// setting `allowed_values` and `denied_values`.
36type Policy_ListPolicy_AllValues int32
37
38const (
39	// Indicates that allowed_values or denied_values must be set.
40	Policy_ListPolicy_ALL_VALUES_UNSPECIFIED Policy_ListPolicy_AllValues = 0
41	// A policy with this set allows all values.
42	Policy_ListPolicy_ALLOW Policy_ListPolicy_AllValues = 1
43	// A policy with this set denies all values.
44	Policy_ListPolicy_DENY Policy_ListPolicy_AllValues = 2
45)
46
47var Policy_ListPolicy_AllValues_name = map[int32]string{
48	0: "ALL_VALUES_UNSPECIFIED",
49	1: "ALLOW",
50	2: "DENY",
51}
52
53var Policy_ListPolicy_AllValues_value = map[string]int32{
54	"ALL_VALUES_UNSPECIFIED": 0,
55	"ALLOW":                  1,
56	"DENY":                   2,
57}
58
59func (x Policy_ListPolicy_AllValues) String() string {
60	return proto.EnumName(Policy_ListPolicy_AllValues_name, int32(x))
61}
62
63func (Policy_ListPolicy_AllValues) EnumDescriptor() ([]byte, []int) {
64	return fileDescriptor_fc4532988da7cf50, []int{0, 0, 0}
65}
66
67// Defines a Cloud Organization `Policy` which is used to specify `Constraints`
68// for configurations of Cloud Platform resources.
69type Policy struct {
70	// Version of the `Policy`. Default version is 0;
71	Version int32 `protobuf:"varint,1,opt,name=version,proto3" json:"version,omitempty"`
72	// The name of the `Constraint` the `Policy` is configuring, for example,
73	// `constraints/serviceuser.services`.
74	//
75	// Immutable after creation.
76	Constraint string `protobuf:"bytes,2,opt,name=constraint,proto3" json:"constraint,omitempty"`
77	// An opaque tag indicating the current version of the `Policy`, used for
78	// concurrency control.
79	//
80	// When the `Policy` is returned from either a `GetPolicy` or a
81	// `ListOrgPolicy` request, this `etag` indicates the version of the current
82	// `Policy` to use when executing a read-modify-write loop.
83	//
84	// When the `Policy` is returned from a `GetEffectivePolicy` request, the
85	// `etag` will be unset.
86	//
87	// When the `Policy` is used in a `SetOrgPolicy` method, use the `etag` value
88	// that was returned from a `GetOrgPolicy` request as part of a
89	// read-modify-write loop for concurrency control. Not setting the `etag`in a
90	// `SetOrgPolicy` request will result in an unconditional write of the
91	// `Policy`.
92	Etag []byte `protobuf:"bytes,3,opt,name=etag,proto3" json:"etag,omitempty"`
93	// The time stamp the `Policy` was previously updated. This is set by the
94	// server, not specified by the caller, and represents the last time a call to
95	// `SetOrgPolicy` was made for that `Policy`. Any value set by the client will
96	// be ignored.
97	UpdateTime *timestamp.Timestamp `protobuf:"bytes,4,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty"`
98	// The field to populate is based on the `constraint_type` value in the
99	// `Constraint`.
100	//   `list_constraint` => `list_policy`
101	//   `boolean_constraint` => `boolean_policy`
102	//
103	//  A `restore_default` message may be used with any `Constraint` type.
104	//
105	// Providing a *_policy that is incompatible with the `constraint_type` will
106	// result in an `invalid_argument` error.
107	//
108	// Attempting to set a `Policy` with a `policy_type` not set will result in an
109	// `invalid_argument` error.
110	//
111	// Types that are valid to be assigned to PolicyType:
112	//	*Policy_ListPolicy_
113	//	*Policy_BooleanPolicy_
114	//	*Policy_RestoreDefault_
115	PolicyType           isPolicy_PolicyType `protobuf_oneof:"policy_type"`
116	XXX_NoUnkeyedLiteral struct{}            `json:"-"`
117	XXX_unrecognized     []byte              `json:"-"`
118	XXX_sizecache        int32               `json:"-"`
119}
120
121func (m *Policy) Reset()         { *m = Policy{} }
122func (m *Policy) String() string { return proto.CompactTextString(m) }
123func (*Policy) ProtoMessage()    {}
124func (*Policy) Descriptor() ([]byte, []int) {
125	return fileDescriptor_fc4532988da7cf50, []int{0}
126}
127
128func (m *Policy) XXX_Unmarshal(b []byte) error {
129	return xxx_messageInfo_Policy.Unmarshal(m, b)
130}
131func (m *Policy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
132	return xxx_messageInfo_Policy.Marshal(b, m, deterministic)
133}
134func (m *Policy) XXX_Merge(src proto.Message) {
135	xxx_messageInfo_Policy.Merge(m, src)
136}
137func (m *Policy) XXX_Size() int {
138	return xxx_messageInfo_Policy.Size(m)
139}
140func (m *Policy) XXX_DiscardUnknown() {
141	xxx_messageInfo_Policy.DiscardUnknown(m)
142}
143
144var xxx_messageInfo_Policy proto.InternalMessageInfo
145
146func (m *Policy) GetVersion() int32 {
147	if m != nil {
148		return m.Version
149	}
150	return 0
151}
152
153func (m *Policy) GetConstraint() string {
154	if m != nil {
155		return m.Constraint
156	}
157	return ""
158}
159
160func (m *Policy) GetEtag() []byte {
161	if m != nil {
162		return m.Etag
163	}
164	return nil
165}
166
167func (m *Policy) GetUpdateTime() *timestamp.Timestamp {
168	if m != nil {
169		return m.UpdateTime
170	}
171	return nil
172}
173
174type isPolicy_PolicyType interface {
175	isPolicy_PolicyType()
176}
177
178type Policy_ListPolicy_ struct {
179	ListPolicy *Policy_ListPolicy `protobuf:"bytes,5,opt,name=list_policy,json=listPolicy,proto3,oneof"`
180}
181
182type Policy_BooleanPolicy_ struct {
183	BooleanPolicy *Policy_BooleanPolicy `protobuf:"bytes,6,opt,name=boolean_policy,json=booleanPolicy,proto3,oneof"`
184}
185
186type Policy_RestoreDefault_ struct {
187	RestoreDefault *Policy_RestoreDefault `protobuf:"bytes,7,opt,name=restore_default,json=restoreDefault,proto3,oneof"`
188}
189
190func (*Policy_ListPolicy_) isPolicy_PolicyType() {}
191
192func (*Policy_BooleanPolicy_) isPolicy_PolicyType() {}
193
194func (*Policy_RestoreDefault_) isPolicy_PolicyType() {}
195
196func (m *Policy) GetPolicyType() isPolicy_PolicyType {
197	if m != nil {
198		return m.PolicyType
199	}
200	return nil
201}
202
203func (m *Policy) GetListPolicy() *Policy_ListPolicy {
204	if x, ok := m.GetPolicyType().(*Policy_ListPolicy_); ok {
205		return x.ListPolicy
206	}
207	return nil
208}
209
210func (m *Policy) GetBooleanPolicy() *Policy_BooleanPolicy {
211	if x, ok := m.GetPolicyType().(*Policy_BooleanPolicy_); ok {
212		return x.BooleanPolicy
213	}
214	return nil
215}
216
217func (m *Policy) GetRestoreDefault() *Policy_RestoreDefault {
218	if x, ok := m.GetPolicyType().(*Policy_RestoreDefault_); ok {
219		return x.RestoreDefault
220	}
221	return nil
222}
223
224// XXX_OneofWrappers is for the internal use of the proto package.
225func (*Policy) XXX_OneofWrappers() []interface{} {
226	return []interface{}{
227		(*Policy_ListPolicy_)(nil),
228		(*Policy_BooleanPolicy_)(nil),
229		(*Policy_RestoreDefault_)(nil),
230	}
231}
232
233// Used in `policy_type` to specify how `list_policy` behaves at this
234// resource.
235//
236// `ListPolicy` can define specific values and subtrees of Cloud Resource
237// Manager resource hierarchy (`Organizations`, `Folders`, `Projects`) that
238// are allowed or denied by setting the `allowed_values` and `denied_values`
239// fields. This is achieved by using the `under:` and optional `is:` prefixes.
240// The `under:` prefix is used to denote resource subtree values.
241// The `is:` prefix is used to denote specific values, and is required only
242// if the value contains a ":". Values prefixed with "is:" are treated the
243// same as values with no prefix.
244// Ancestry subtrees must be in one of the following formats:
245//     - "projects/<project-id>", e.g. "projects/tokyo-rain-123"
246//     - "folders/<folder-id>", e.g. "folders/1234"
247//     - "organizations/<organization-id>", e.g. "organizations/1234"
248// The `supports_under` field of the associated `Constraint`  defines whether
249// ancestry prefixes can be used. You can set `allowed_values` and
250// `denied_values` in the same `Policy` if `all_values` is
251// `ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all
252// values. If `all_values` is set to either `ALLOW` or `DENY`,
253// `allowed_values` and `denied_values` must be unset.
254type Policy_ListPolicy struct {
255	// List of values allowed  at this resource. Can only be set if `all_values`
256	// is set to `ALL_VALUES_UNSPECIFIED`.
257	AllowedValues []string `protobuf:"bytes,1,rep,name=allowed_values,json=allowedValues,proto3" json:"allowed_values,omitempty"`
258	// List of values denied at this resource. Can only be set if `all_values`
259	// is set to `ALL_VALUES_UNSPECIFIED`.
260	DeniedValues []string `protobuf:"bytes,2,rep,name=denied_values,json=deniedValues,proto3" json:"denied_values,omitempty"`
261	// The policy all_values state.
262	AllValues Policy_ListPolicy_AllValues `protobuf:"varint,3,opt,name=all_values,json=allValues,proto3,enum=google.cloud.orgpolicy.v1.Policy_ListPolicy_AllValues" json:"all_values,omitempty"`
263	// Optional. The Google Cloud Console will try to default to a configuration
264	// that matches the value specified in this `Policy`. If `suggested_value`
265	// is not set, it will inherit the value specified higher in the hierarchy,
266	// unless `inherit_from_parent` is `false`.
267	SuggestedValue string `protobuf:"bytes,4,opt,name=suggested_value,json=suggestedValue,proto3" json:"suggested_value,omitempty"`
268	// Determines the inheritance behavior for this `Policy`.
269	//
270	// By default, a `ListPolicy` set at a resource supercedes any `Policy` set
271	// anywhere up the resource hierarchy. However, if `inherit_from_parent` is
272	// set to `true`, then the values from the effective `Policy` of the parent
273	// resource are inherited, meaning the values set in this `Policy` are
274	// added to the values inherited up the hierarchy.
275	//
276	// Setting `Policy` hierarchies that inherit both allowed values and denied
277	// values isn't recommended in most circumstances to keep the configuration
278	// simple and understandable. However, it is possible to set a `Policy` with
279	// `allowed_values` set that inherits a `Policy` with `denied_values` set.
280	// In this case, the values that are allowed must be in `allowed_values` and
281	// not present in `denied_values`.
282	//
283	// For example, suppose you have a `Constraint`
284	// `constraints/serviceuser.services`, which has a `constraint_type` of
285	// `list_constraint`, and with `constraint_default` set to `ALLOW`.
286	// Suppose that at the Organization level, a `Policy` is applied that
287	// restricts the allowed API activations to {`E1`, `E2`}. Then, if a
288	// `Policy` is applied to a project below the Organization that has
289	// `inherit_from_parent` set to `false` and field all_values set to DENY,
290	// then an attempt to activate any API will be denied.
291	//
292	// The following examples demonstrate different possible layerings for
293	// `projects/bar` parented by `organizations/foo`:
294	//
295	// Example 1 (no inherited values):
296	//   `organizations/foo` has a `Policy` with values:
297	//     {allowed_values: "E1" allowed_values:"E2"}
298	//   `projects/bar` has `inherit_from_parent` `false` and values:
299	//     {allowed_values: "E3" allowed_values: "E4"}
300	// The accepted values at `organizations/foo` are `E1`, `E2`.
301	// The accepted values at `projects/bar` are `E3`, and `E4`.
302	//
303	// Example 2 (inherited values):
304	//   `organizations/foo` has a `Policy` with values:
305	//     {allowed_values: "E1" allowed_values:"E2"}
306	//   `projects/bar` has a `Policy` with values:
307	//     {value: "E3" value: "E4" inherit_from_parent: true}
308	// The accepted values at `organizations/foo` are `E1`, `E2`.
309	// The accepted values at `projects/bar` are `E1`, `E2`, `E3`, and `E4`.
310	//
311	// Example 3 (inheriting both allowed and denied values):
312	//   `organizations/foo` has a `Policy` with values:
313	//     {allowed_values: "E1" allowed_values: "E2"}
314	//   `projects/bar` has a `Policy` with:
315	//     {denied_values: "E1"}
316	// The accepted values at `organizations/foo` are `E1`, `E2`.
317	// The value accepted at `projects/bar` is `E2`.
318	//
319	// Example 4 (RestoreDefault):
320	//   `organizations/foo` has a `Policy` with values:
321	//     {allowed_values: "E1" allowed_values:"E2"}
322	//   `projects/bar` has a `Policy` with values:
323	//     {RestoreDefault: {}}
324	// The accepted values at `organizations/foo` are `E1`, `E2`.
325	// The accepted values at `projects/bar` are either all or none depending on
326	// the value of `constraint_default` (if `ALLOW`, all; if
327	// `DENY`, none).
328	//
329	// Example 5 (no policy inherits parent policy):
330	//   `organizations/foo` has no `Policy` set.
331	//   `projects/bar` has no `Policy` set.
332	// The accepted values at both levels are either all or none depending on
333	// the value of `constraint_default` (if `ALLOW`, all; if
334	// `DENY`, none).
335	//
336	// Example 6 (ListConstraint allowing all):
337	//   `organizations/foo` has a `Policy` with values:
338	//     {allowed_values: "E1" allowed_values: "E2"}
339	//   `projects/bar` has a `Policy` with:
340	//     {all: ALLOW}
341	// The accepted values at `organizations/foo` are `E1`, E2`.
342	// Any value is accepted at `projects/bar`.
343	//
344	// Example 7 (ListConstraint allowing none):
345	//   `organizations/foo` has a `Policy` with values:
346	//     {allowed_values: "E1" allowed_values: "E2"}
347	//   `projects/bar` has a `Policy` with:
348	//     {all: DENY}
349	// The accepted values at `organizations/foo` are `E1`, E2`.
350	// No value is accepted at `projects/bar`.
351	//
352	// Example 10 (allowed and denied subtrees of Resource Manager hierarchy):
353	// Given the following resource hierarchy
354	//   O1->{F1, F2}; F1->{P1}; F2->{P2, P3},
355	//   `organizations/foo` has a `Policy` with values:
356	//     {allowed_values: "under:organizations/O1"}
357	//   `projects/bar` has a `Policy` with:
358	//     {allowed_values: "under:projects/P3"}
359	//     {denied_values: "under:folders/F2"}
360	// The accepted values at `organizations/foo` are `organizations/O1`,
361	//   `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`,
362	//   `projects/P3`.
363	// The accepted values at `projects/bar` are `organizations/O1`,
364	//   `folders/F1`, `projects/P1`.
365	InheritFromParent    bool     `protobuf:"varint,5,opt,name=inherit_from_parent,json=inheritFromParent,proto3" json:"inherit_from_parent,omitempty"`
366	XXX_NoUnkeyedLiteral struct{} `json:"-"`
367	XXX_unrecognized     []byte   `json:"-"`
368	XXX_sizecache        int32    `json:"-"`
369}
370
371func (m *Policy_ListPolicy) Reset()         { *m = Policy_ListPolicy{} }
372func (m *Policy_ListPolicy) String() string { return proto.CompactTextString(m) }
373func (*Policy_ListPolicy) ProtoMessage()    {}
374func (*Policy_ListPolicy) Descriptor() ([]byte, []int) {
375	return fileDescriptor_fc4532988da7cf50, []int{0, 0}
376}
377
378func (m *Policy_ListPolicy) XXX_Unmarshal(b []byte) error {
379	return xxx_messageInfo_Policy_ListPolicy.Unmarshal(m, b)
380}
381func (m *Policy_ListPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
382	return xxx_messageInfo_Policy_ListPolicy.Marshal(b, m, deterministic)
383}
384func (m *Policy_ListPolicy) XXX_Merge(src proto.Message) {
385	xxx_messageInfo_Policy_ListPolicy.Merge(m, src)
386}
387func (m *Policy_ListPolicy) XXX_Size() int {
388	return xxx_messageInfo_Policy_ListPolicy.Size(m)
389}
390func (m *Policy_ListPolicy) XXX_DiscardUnknown() {
391	xxx_messageInfo_Policy_ListPolicy.DiscardUnknown(m)
392}
393
394var xxx_messageInfo_Policy_ListPolicy proto.InternalMessageInfo
395
396func (m *Policy_ListPolicy) GetAllowedValues() []string {
397	if m != nil {
398		return m.AllowedValues
399	}
400	return nil
401}
402
403func (m *Policy_ListPolicy) GetDeniedValues() []string {
404	if m != nil {
405		return m.DeniedValues
406	}
407	return nil
408}
409
410func (m *Policy_ListPolicy) GetAllValues() Policy_ListPolicy_AllValues {
411	if m != nil {
412		return m.AllValues
413	}
414	return Policy_ListPolicy_ALL_VALUES_UNSPECIFIED
415}
416
417func (m *Policy_ListPolicy) GetSuggestedValue() string {
418	if m != nil {
419		return m.SuggestedValue
420	}
421	return ""
422}
423
424func (m *Policy_ListPolicy) GetInheritFromParent() bool {
425	if m != nil {
426		return m.InheritFromParent
427	}
428	return false
429}
430
431// Used in `policy_type` to specify how `boolean_policy` will behave at this
432// resource.
433type Policy_BooleanPolicy struct {
434	// If `true`, then the `Policy` is enforced. If `false`, then any
435	// configuration is acceptable.
436	//
437	// Suppose you have a `Constraint`
438	// `constraints/compute.disableSerialPortAccess` with `constraint_default`
439	// set to `ALLOW`. A `Policy` for that `Constraint` exhibits the following
440	// behavior:
441	//   - If the `Policy` at this resource has enforced set to `false`, serial
442	//     port connection attempts will be allowed.
443	//   - If the `Policy` at this resource has enforced set to `true`, serial
444	//     port connection attempts will be refused.
445	//   - If the `Policy` at this resource is `RestoreDefault`, serial port
446	//     connection attempts will be allowed.
447	//   - If no `Policy` is set at this resource or anywhere higher in the
448	//     resource hierarchy, serial port connection attempts will be allowed.
449	//   - If no `Policy` is set at this resource, but one exists higher in the
450	//     resource hierarchy, the behavior is as if the`Policy` were set at
451	//     this resource.
452	//
453	// The following examples demonstrate the different possible layerings:
454	//
455	// Example 1 (nearest `Constraint` wins):
456	//   `organizations/foo` has a `Policy` with:
457	//     {enforced: false}
458	//   `projects/bar` has no `Policy` set.
459	// The constraint at `projects/bar` and `organizations/foo` will not be
460	// enforced.
461	//
462	// Example 2 (enforcement gets replaced):
463	//   `organizations/foo` has a `Policy` with:
464	//     {enforced: false}
465	//   `projects/bar` has a `Policy` with:
466	//     {enforced: true}
467	// The constraint at `organizations/foo` is not enforced.
468	// The constraint at `projects/bar` is enforced.
469	//
470	// Example 3 (RestoreDefault):
471	//   `organizations/foo` has a `Policy` with:
472	//     {enforced: true}
473	//   `projects/bar` has a `Policy` with:
474	//     {RestoreDefault: {}}
475	// The constraint at `organizations/foo` is enforced.
476	// The constraint at `projects/bar` is not enforced, because
477	// `constraint_default` for the `Constraint` is `ALLOW`.
478	Enforced             bool     `protobuf:"varint,1,opt,name=enforced,proto3" json:"enforced,omitempty"`
479	XXX_NoUnkeyedLiteral struct{} `json:"-"`
480	XXX_unrecognized     []byte   `json:"-"`
481	XXX_sizecache        int32    `json:"-"`
482}
483
484func (m *Policy_BooleanPolicy) Reset()         { *m = Policy_BooleanPolicy{} }
485func (m *Policy_BooleanPolicy) String() string { return proto.CompactTextString(m) }
486func (*Policy_BooleanPolicy) ProtoMessage()    {}
487func (*Policy_BooleanPolicy) Descriptor() ([]byte, []int) {
488	return fileDescriptor_fc4532988da7cf50, []int{0, 1}
489}
490
491func (m *Policy_BooleanPolicy) XXX_Unmarshal(b []byte) error {
492	return xxx_messageInfo_Policy_BooleanPolicy.Unmarshal(m, b)
493}
494func (m *Policy_BooleanPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
495	return xxx_messageInfo_Policy_BooleanPolicy.Marshal(b, m, deterministic)
496}
497func (m *Policy_BooleanPolicy) XXX_Merge(src proto.Message) {
498	xxx_messageInfo_Policy_BooleanPolicy.Merge(m, src)
499}
500func (m *Policy_BooleanPolicy) XXX_Size() int {
501	return xxx_messageInfo_Policy_BooleanPolicy.Size(m)
502}
503func (m *Policy_BooleanPolicy) XXX_DiscardUnknown() {
504	xxx_messageInfo_Policy_BooleanPolicy.DiscardUnknown(m)
505}
506
507var xxx_messageInfo_Policy_BooleanPolicy proto.InternalMessageInfo
508
509func (m *Policy_BooleanPolicy) GetEnforced() bool {
510	if m != nil {
511		return m.Enforced
512	}
513	return false
514}
515
516// Ignores policies set above this resource and restores the
517// `constraint_default` enforcement behavior of the specific `Constraint` at
518// this resource.
519//
520// Suppose that `constraint_default` is set to `ALLOW` for the
521// `Constraint` `constraints/serviceuser.services`. Suppose that organization
522// foo.com sets a `Policy` at their Organization resource node that restricts
523// the allowed service activations to deny all service activations. They
524// could then set a `Policy` with the `policy_type` `restore_default` on
525// several experimental projects, restoring the `constraint_default`
526// enforcement of the `Constraint` for only those projects, allowing those
527// projects to have all services activated.
528type Policy_RestoreDefault struct {
529	XXX_NoUnkeyedLiteral struct{} `json:"-"`
530	XXX_unrecognized     []byte   `json:"-"`
531	XXX_sizecache        int32    `json:"-"`
532}
533
534func (m *Policy_RestoreDefault) Reset()         { *m = Policy_RestoreDefault{} }
535func (m *Policy_RestoreDefault) String() string { return proto.CompactTextString(m) }
536func (*Policy_RestoreDefault) ProtoMessage()    {}
537func (*Policy_RestoreDefault) Descriptor() ([]byte, []int) {
538	return fileDescriptor_fc4532988da7cf50, []int{0, 2}
539}
540
541func (m *Policy_RestoreDefault) XXX_Unmarshal(b []byte) error {
542	return xxx_messageInfo_Policy_RestoreDefault.Unmarshal(m, b)
543}
544func (m *Policy_RestoreDefault) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
545	return xxx_messageInfo_Policy_RestoreDefault.Marshal(b, m, deterministic)
546}
547func (m *Policy_RestoreDefault) XXX_Merge(src proto.Message) {
548	xxx_messageInfo_Policy_RestoreDefault.Merge(m, src)
549}
550func (m *Policy_RestoreDefault) XXX_Size() int {
551	return xxx_messageInfo_Policy_RestoreDefault.Size(m)
552}
553func (m *Policy_RestoreDefault) XXX_DiscardUnknown() {
554	xxx_messageInfo_Policy_RestoreDefault.DiscardUnknown(m)
555}
556
557var xxx_messageInfo_Policy_RestoreDefault proto.InternalMessageInfo
558
559func init() {
560	proto.RegisterEnum("google.cloud.orgpolicy.v1.Policy_ListPolicy_AllValues", Policy_ListPolicy_AllValues_name, Policy_ListPolicy_AllValues_value)
561	proto.RegisterType((*Policy)(nil), "google.cloud.orgpolicy.v1.Policy")
562	proto.RegisterType((*Policy_ListPolicy)(nil), "google.cloud.orgpolicy.v1.Policy.ListPolicy")
563	proto.RegisterType((*Policy_BooleanPolicy)(nil), "google.cloud.orgpolicy.v1.Policy.BooleanPolicy")
564	proto.RegisterType((*Policy_RestoreDefault)(nil), "google.cloud.orgpolicy.v1.Policy.RestoreDefault")
565}
566
567func init() {
568	proto.RegisterFile("google/cloud/orgpolicy/v1/orgpolicy.proto", fileDescriptor_fc4532988da7cf50)
569}
570
571var fileDescriptor_fc4532988da7cf50 = []byte{
572	// 620 bytes of a gzipped FileDescriptorProto
573	0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x94, 0x54, 0xdd, 0x6e, 0xd3, 0x30,
574	0x14, 0x5e, 0xba, 0xad, 0x6b, 0x4f, 0xd7, 0xac, 0x18, 0x09, 0x65, 0x61, 0x40, 0x35, 0x84, 0x28,
575	0x02, 0x25, 0x74, 0x48, 0x5c, 0x74, 0xdc, 0xb4, 0x5b, 0xc7, 0x26, 0x55, 0x5b, 0x95, 0xb1, 0xf2,
576	0x37, 0x29, 0x72, 0x5b, 0x37, 0x44, 0x72, 0xed, 0xc8, 0x71, 0x8a, 0xf6, 0x4a, 0x5c, 0xf2, 0x10,
577	0x5c, 0x20, 0x9e, 0x84, 0xa7, 0x40, 0xb5, 0x93, 0x74, 0x45, 0x4c, 0x13, 0x77, 0x3e, 0xdf, 0xf7,
578	0x9d, 0xef, 0x1c, 0x9f, 0xe3, 0x04, 0x9e, 0x05, 0x9c, 0x07, 0x94, 0xb8, 0x23, 0xca, 0x93, 0xb1,
579	0xcb, 0x45, 0x10, 0x71, 0x1a, 0x8e, 0xae, 0xdc, 0x59, 0x73, 0x11, 0x38, 0x91, 0xe0, 0x92, 0xa3,
580	0x6d, 0x2d, 0x75, 0x94, 0xd4, 0x59, 0xb0, 0xb3, 0xa6, 0x7d, 0x3f, 0x75, 0x51, 0xc2, 0x61, 0x32,
581	0x71, 0xc9, 0x34, 0x92, 0x69, 0x9e, 0xfd, 0xe8, 0x6f, 0x52, 0x86, 0x53, 0x12, 0x4b, 0x3c, 0x8d,
582	0x52, 0xc1, 0x4e, 0x2a, 0xc0, 0x51, 0xe8, 0x62, 0xc6, 0xb8, 0xc4, 0x32, 0xe4, 0x2c, 0xd6, 0xec,
583	0xee, 0xf7, 0x22, 0x14, 0xfb, 0xaa, 0x12, 0xb2, 0x60, 0x63, 0x46, 0x44, 0x1c, 0x72, 0x66, 0x19,
584	0x75, 0xa3, 0xb1, 0xee, 0x65, 0x21, 0x7a, 0x08, 0x30, 0xe2, 0x2c, 0x96, 0x02, 0x87, 0x4c, 0x5a,
585	0x85, 0xba, 0xd1, 0x28, 0x7b, 0xd7, 0x10, 0x84, 0x60, 0x8d, 0x48, 0x1c, 0x58, 0xab, 0x75, 0xa3,
586	0xb1, 0xe9, 0xa9, 0x33, 0xda, 0x87, 0x4a, 0x12, 0x8d, 0xb1, 0x24, 0xfe, 0xbc, 0x21, 0x6b, 0xad,
587	0x6e, 0x34, 0x2a, 0x7b, 0xb6, 0x93, 0xde, 0x32, 0xeb, 0xd6, 0x79, 0x97, 0x75, 0xeb, 0x81, 0x96,
588	0xcf, 0x01, 0x74, 0x06, 0x15, 0x1a, 0xc6, 0xd2, 0xd7, 0x33, 0xb0, 0xd6, 0x55, 0xf2, 0x0b, 0xe7,
589	0xc6, 0x11, 0x39, 0xfa, 0x0a, 0x4e, 0x2f, 0x8c, 0xa5, 0x3e, 0x1e, 0xaf, 0x78, 0x40, 0xf3, 0x08,
590	0x7d, 0x00, 0x73, 0xc8, 0x39, 0x25, 0x98, 0x65, 0x9e, 0x45, 0xe5, 0xe9, 0xde, 0xee, 0xd9, 0xd1,
591	0x79, 0xb9, 0x6d, 0x75, 0x78, 0x1d, 0x40, 0x9f, 0x61, 0x4b, 0x90, 0x58, 0x72, 0x41, 0xfc, 0x31,
592	0x99, 0xe0, 0x84, 0x4a, 0x6b, 0x43, 0x59, 0xbf, 0xbc, 0xdd, 0xda, 0xd3, 0x89, 0x87, 0x3a, 0xef,
593	0x78, 0xc5, 0x33, 0xc5, 0x12, 0x62, 0xff, 0x28, 0x00, 0x2c, 0xee, 0x84, 0x9e, 0x80, 0x89, 0x29,
594	0xe5, 0x5f, 0xc9, 0xd8, 0x9f, 0x61, 0x9a, 0x90, 0xd8, 0x32, 0xea, 0xab, 0x8d, 0xb2, 0x57, 0x4d,
595	0xd1, 0x81, 0x02, 0xd1, 0x63, 0xa8, 0x8e, 0x09, 0x0b, 0x17, 0xaa, 0x82, 0x52, 0x6d, 0x6a, 0x30,
596	0x15, 0x5d, 0x00, 0x60, 0x4a, 0x33, 0xc5, 0x7c, 0x73, 0xe6, 0xde, 0xeb, 0xff, 0x99, 0xb0, 0xd3,
597	0xa6, 0x54, 0x7b, 0x79, 0x65, 0x9c, 0x1d, 0xd1, 0x53, 0xd8, 0x8a, 0x93, 0x20, 0x20, 0xb1, 0xcc,
598	0xca, 0xab, 0xd5, 0x97, 0x3d, 0x33, 0x87, 0x95, 0x12, 0x39, 0x70, 0x37, 0x64, 0x5f, 0x88, 0x08,
599	0xa5, 0x3f, 0x11, 0x7c, 0xea, 0x47, 0x58, 0x10, 0x26, 0xd5, 0xaa, 0x4b, 0xde, 0x9d, 0x94, 0x3a,
600	0x12, 0x7c, 0xda, 0x57, 0xc4, 0xee, 0x1b, 0x28, 0xe7, 0x05, 0x91, 0x0d, 0xf7, 0xda, 0xbd, 0x9e,
601	0x3f, 0x68, 0xf7, 0x2e, 0xba, 0xe7, 0xfe, 0xc5, 0xe9, 0x79, 0xbf, 0x7b, 0x70, 0x72, 0x74, 0xd2,
602	0x3d, 0xac, 0xad, 0xa0, 0x32, 0xac, 0xb7, 0x7b, 0xbd, 0xb3, 0xf7, 0x35, 0x03, 0x95, 0x60, 0xed,
603	0xb0, 0x7b, 0xfa, 0xb1, 0x56, 0xb0, 0x9f, 0x43, 0x75, 0x69, 0x8f, 0xc8, 0x86, 0x12, 0x61, 0x13,
604	0x2e, 0x46, 0x64, 0xac, 0x5e, 0x7b, 0xc9, 0xcb, 0x63, 0xbb, 0x06, 0xe6, 0xf2, 0x66, 0x3a, 0x55,
605	0xa8, 0xe8, 0x49, 0xf8, 0xf2, 0x2a, 0x22, 0x9d, 0x5f, 0x06, 0x3c, 0x18, 0xf1, 0xe9, 0xcd, 0xd3,
606	0xea, 0x98, 0x67, 0x22, 0xd0, 0x95, 0xfa, 0xf3, 0x97, 0xde, 0x37, 0x3e, 0x75, 0x52, 0x71, 0xc0,
607	0x29, 0x66, 0xc1, 0x5c, 0xed, 0x06, 0x84, 0xa9, 0xef, 0xc0, 0xd5, 0x14, 0x8e, 0xc2, 0xf8, 0x1f,
608	0x7f, 0x8a, 0xfd, 0x3c, 0xf8, 0x56, 0xd8, 0x7e, 0xab, 0x4d, 0x0e, 0x54, 0xc5, 0xbc, 0x86, 0x33,
609	0x68, 0xfe, 0xcc, 0xb8, 0x4b, 0xc5, 0x5d, 0xe6, 0xdc, 0xe5, 0xa0, 0xf9, 0xbb, 0xb0, 0xa3, 0xb9,
610	0x56, 0x4b, 0x91, 0xad, 0x56, 0xce, 0xb6, 0x5a, 0x83, 0xe6, 0xb0, 0xa8, 0xba, 0x78, 0xf5, 0x27,
611	0x00, 0x00, 0xff, 0xff, 0x06, 0x74, 0xf5, 0xa8, 0xae, 0x04, 0x00, 0x00,
612}
613