1// Code generated by protoc-gen-go. DO NOT EDIT. 2// source: google/cloud/orgpolicy/v1/orgpolicy.proto 3 4package orgpolicy 5 6import ( 7 fmt "fmt" 8 math "math" 9 10 proto "github.com/golang/protobuf/proto" 11 _ "github.com/golang/protobuf/ptypes/empty" 12 timestamp "github.com/golang/protobuf/ptypes/timestamp" 13 _ "google.golang.org/genproto/googleapis/api/annotations" 14) 15 16// Reference imports to suppress errors if they are not otherwise used. 17var _ = proto.Marshal 18var _ = fmt.Errorf 19var _ = math.Inf 20 21// This is a compile-time assertion to ensure that this generated file 22// is compatible with the proto package it is being compiled against. 23// A compilation error at this line likely means your copy of the 24// proto package needs to be updated. 25const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package 26 27// This enum can be used to set `Policies` that apply to all possible 28// configuration values rather than specific values in `allowed_values` or 29// `denied_values`. 30// 31// Settting this to `ALLOW` will mean this `Policy` allows all values. 32// Similarly, setting it to `DENY` will mean no values are allowed. If 33// set to either `ALLOW` or `DENY, `allowed_values` and `denied_values` 34// must be unset. Setting this to `ALL_VALUES_UNSPECIFIED` allows for 35// setting `allowed_values` and `denied_values`. 36type Policy_ListPolicy_AllValues int32 37 38const ( 39 // Indicates that allowed_values or denied_values must be set. 40 Policy_ListPolicy_ALL_VALUES_UNSPECIFIED Policy_ListPolicy_AllValues = 0 41 // A policy with this set allows all values. 42 Policy_ListPolicy_ALLOW Policy_ListPolicy_AllValues = 1 43 // A policy with this set denies all values. 44 Policy_ListPolicy_DENY Policy_ListPolicy_AllValues = 2 45) 46 47var Policy_ListPolicy_AllValues_name = map[int32]string{ 48 0: "ALL_VALUES_UNSPECIFIED", 49 1: "ALLOW", 50 2: "DENY", 51} 52 53var Policy_ListPolicy_AllValues_value = map[string]int32{ 54 "ALL_VALUES_UNSPECIFIED": 0, 55 "ALLOW": 1, 56 "DENY": 2, 57} 58 59func (x Policy_ListPolicy_AllValues) String() string { 60 return proto.EnumName(Policy_ListPolicy_AllValues_name, int32(x)) 61} 62 63func (Policy_ListPolicy_AllValues) EnumDescriptor() ([]byte, []int) { 64 return fileDescriptor_fc4532988da7cf50, []int{0, 0, 0} 65} 66 67// Defines a Cloud Organization `Policy` which is used to specify `Constraints` 68// for configurations of Cloud Platform resources. 69type Policy struct { 70 // Version of the `Policy`. Default version is 0; 71 Version int32 `protobuf:"varint,1,opt,name=version,proto3" json:"version,omitempty"` 72 // The name of the `Constraint` the `Policy` is configuring, for example, 73 // `constraints/serviceuser.services`. 74 // 75 // Immutable after creation. 76 Constraint string `protobuf:"bytes,2,opt,name=constraint,proto3" json:"constraint,omitempty"` 77 // An opaque tag indicating the current version of the `Policy`, used for 78 // concurrency control. 79 // 80 // When the `Policy` is returned from either a `GetPolicy` or a 81 // `ListOrgPolicy` request, this `etag` indicates the version of the current 82 // `Policy` to use when executing a read-modify-write loop. 83 // 84 // When the `Policy` is returned from a `GetEffectivePolicy` request, the 85 // `etag` will be unset. 86 // 87 // When the `Policy` is used in a `SetOrgPolicy` method, use the `etag` value 88 // that was returned from a `GetOrgPolicy` request as part of a 89 // read-modify-write loop for concurrency control. Not setting the `etag`in a 90 // `SetOrgPolicy` request will result in an unconditional write of the 91 // `Policy`. 92 Etag []byte `protobuf:"bytes,3,opt,name=etag,proto3" json:"etag,omitempty"` 93 // The time stamp the `Policy` was previously updated. This is set by the 94 // server, not specified by the caller, and represents the last time a call to 95 // `SetOrgPolicy` was made for that `Policy`. Any value set by the client will 96 // be ignored. 97 UpdateTime *timestamp.Timestamp `protobuf:"bytes,4,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty"` 98 // The field to populate is based on the `constraint_type` value in the 99 // `Constraint`. 100 // `list_constraint` => `list_policy` 101 // `boolean_constraint` => `boolean_policy` 102 // 103 // A `restore_default` message may be used with any `Constraint` type. 104 // 105 // Providing a *_policy that is incompatible with the `constraint_type` will 106 // result in an `invalid_argument` error. 107 // 108 // Attempting to set a `Policy` with a `policy_type` not set will result in an 109 // `invalid_argument` error. 110 // 111 // Types that are valid to be assigned to PolicyType: 112 // *Policy_ListPolicy_ 113 // *Policy_BooleanPolicy_ 114 // *Policy_RestoreDefault_ 115 PolicyType isPolicy_PolicyType `protobuf_oneof:"policy_type"` 116 XXX_NoUnkeyedLiteral struct{} `json:"-"` 117 XXX_unrecognized []byte `json:"-"` 118 XXX_sizecache int32 `json:"-"` 119} 120 121func (m *Policy) Reset() { *m = Policy{} } 122func (m *Policy) String() string { return proto.CompactTextString(m) } 123func (*Policy) ProtoMessage() {} 124func (*Policy) Descriptor() ([]byte, []int) { 125 return fileDescriptor_fc4532988da7cf50, []int{0} 126} 127 128func (m *Policy) XXX_Unmarshal(b []byte) error { 129 return xxx_messageInfo_Policy.Unmarshal(m, b) 130} 131func (m *Policy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 132 return xxx_messageInfo_Policy.Marshal(b, m, deterministic) 133} 134func (m *Policy) XXX_Merge(src proto.Message) { 135 xxx_messageInfo_Policy.Merge(m, src) 136} 137func (m *Policy) XXX_Size() int { 138 return xxx_messageInfo_Policy.Size(m) 139} 140func (m *Policy) XXX_DiscardUnknown() { 141 xxx_messageInfo_Policy.DiscardUnknown(m) 142} 143 144var xxx_messageInfo_Policy proto.InternalMessageInfo 145 146func (m *Policy) GetVersion() int32 { 147 if m != nil { 148 return m.Version 149 } 150 return 0 151} 152 153func (m *Policy) GetConstraint() string { 154 if m != nil { 155 return m.Constraint 156 } 157 return "" 158} 159 160func (m *Policy) GetEtag() []byte { 161 if m != nil { 162 return m.Etag 163 } 164 return nil 165} 166 167func (m *Policy) GetUpdateTime() *timestamp.Timestamp { 168 if m != nil { 169 return m.UpdateTime 170 } 171 return nil 172} 173 174type isPolicy_PolicyType interface { 175 isPolicy_PolicyType() 176} 177 178type Policy_ListPolicy_ struct { 179 ListPolicy *Policy_ListPolicy `protobuf:"bytes,5,opt,name=list_policy,json=listPolicy,proto3,oneof"` 180} 181 182type Policy_BooleanPolicy_ struct { 183 BooleanPolicy *Policy_BooleanPolicy `protobuf:"bytes,6,opt,name=boolean_policy,json=booleanPolicy,proto3,oneof"` 184} 185 186type Policy_RestoreDefault_ struct { 187 RestoreDefault *Policy_RestoreDefault `protobuf:"bytes,7,opt,name=restore_default,json=restoreDefault,proto3,oneof"` 188} 189 190func (*Policy_ListPolicy_) isPolicy_PolicyType() {} 191 192func (*Policy_BooleanPolicy_) isPolicy_PolicyType() {} 193 194func (*Policy_RestoreDefault_) isPolicy_PolicyType() {} 195 196func (m *Policy) GetPolicyType() isPolicy_PolicyType { 197 if m != nil { 198 return m.PolicyType 199 } 200 return nil 201} 202 203func (m *Policy) GetListPolicy() *Policy_ListPolicy { 204 if x, ok := m.GetPolicyType().(*Policy_ListPolicy_); ok { 205 return x.ListPolicy 206 } 207 return nil 208} 209 210func (m *Policy) GetBooleanPolicy() *Policy_BooleanPolicy { 211 if x, ok := m.GetPolicyType().(*Policy_BooleanPolicy_); ok { 212 return x.BooleanPolicy 213 } 214 return nil 215} 216 217func (m *Policy) GetRestoreDefault() *Policy_RestoreDefault { 218 if x, ok := m.GetPolicyType().(*Policy_RestoreDefault_); ok { 219 return x.RestoreDefault 220 } 221 return nil 222} 223 224// XXX_OneofWrappers is for the internal use of the proto package. 225func (*Policy) XXX_OneofWrappers() []interface{} { 226 return []interface{}{ 227 (*Policy_ListPolicy_)(nil), 228 (*Policy_BooleanPolicy_)(nil), 229 (*Policy_RestoreDefault_)(nil), 230 } 231} 232 233// Used in `policy_type` to specify how `list_policy` behaves at this 234// resource. 235// 236// `ListPolicy` can define specific values and subtrees of Cloud Resource 237// Manager resource hierarchy (`Organizations`, `Folders`, `Projects`) that 238// are allowed or denied by setting the `allowed_values` and `denied_values` 239// fields. This is achieved by using the `under:` and optional `is:` prefixes. 240// The `under:` prefix is used to denote resource subtree values. 241// The `is:` prefix is used to denote specific values, and is required only 242// if the value contains a ":". Values prefixed with "is:" are treated the 243// same as values with no prefix. 244// Ancestry subtrees must be in one of the following formats: 245// - "projects/<project-id>", e.g. "projects/tokyo-rain-123" 246// - "folders/<folder-id>", e.g. "folders/1234" 247// - "organizations/<organization-id>", e.g. "organizations/1234" 248// The `supports_under` field of the associated `Constraint` defines whether 249// ancestry prefixes can be used. You can set `allowed_values` and 250// `denied_values` in the same `Policy` if `all_values` is 251// `ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all 252// values. If `all_values` is set to either `ALLOW` or `DENY`, 253// `allowed_values` and `denied_values` must be unset. 254type Policy_ListPolicy struct { 255 // List of values allowed at this resource. Can only be set if `all_values` 256 // is set to `ALL_VALUES_UNSPECIFIED`. 257 AllowedValues []string `protobuf:"bytes,1,rep,name=allowed_values,json=allowedValues,proto3" json:"allowed_values,omitempty"` 258 // List of values denied at this resource. Can only be set if `all_values` 259 // is set to `ALL_VALUES_UNSPECIFIED`. 260 DeniedValues []string `protobuf:"bytes,2,rep,name=denied_values,json=deniedValues,proto3" json:"denied_values,omitempty"` 261 // The policy all_values state. 262 AllValues Policy_ListPolicy_AllValues `protobuf:"varint,3,opt,name=all_values,json=allValues,proto3,enum=google.cloud.orgpolicy.v1.Policy_ListPolicy_AllValues" json:"all_values,omitempty"` 263 // Optional. The Google Cloud Console will try to default to a configuration 264 // that matches the value specified in this `Policy`. If `suggested_value` 265 // is not set, it will inherit the value specified higher in the hierarchy, 266 // unless `inherit_from_parent` is `false`. 267 SuggestedValue string `protobuf:"bytes,4,opt,name=suggested_value,json=suggestedValue,proto3" json:"suggested_value,omitempty"` 268 // Determines the inheritance behavior for this `Policy`. 269 // 270 // By default, a `ListPolicy` set at a resource supercedes any `Policy` set 271 // anywhere up the resource hierarchy. However, if `inherit_from_parent` is 272 // set to `true`, then the values from the effective `Policy` of the parent 273 // resource are inherited, meaning the values set in this `Policy` are 274 // added to the values inherited up the hierarchy. 275 // 276 // Setting `Policy` hierarchies that inherit both allowed values and denied 277 // values isn't recommended in most circumstances to keep the configuration 278 // simple and understandable. However, it is possible to set a `Policy` with 279 // `allowed_values` set that inherits a `Policy` with `denied_values` set. 280 // In this case, the values that are allowed must be in `allowed_values` and 281 // not present in `denied_values`. 282 // 283 // For example, suppose you have a `Constraint` 284 // `constraints/serviceuser.services`, which has a `constraint_type` of 285 // `list_constraint`, and with `constraint_default` set to `ALLOW`. 286 // Suppose that at the Organization level, a `Policy` is applied that 287 // restricts the allowed API activations to {`E1`, `E2`}. Then, if a 288 // `Policy` is applied to a project below the Organization that has 289 // `inherit_from_parent` set to `false` and field all_values set to DENY, 290 // then an attempt to activate any API will be denied. 291 // 292 // The following examples demonstrate different possible layerings for 293 // `projects/bar` parented by `organizations/foo`: 294 // 295 // Example 1 (no inherited values): 296 // `organizations/foo` has a `Policy` with values: 297 // {allowed_values: "E1" allowed_values:"E2"} 298 // `projects/bar` has `inherit_from_parent` `false` and values: 299 // {allowed_values: "E3" allowed_values: "E4"} 300 // The accepted values at `organizations/foo` are `E1`, `E2`. 301 // The accepted values at `projects/bar` are `E3`, and `E4`. 302 // 303 // Example 2 (inherited values): 304 // `organizations/foo` has a `Policy` with values: 305 // {allowed_values: "E1" allowed_values:"E2"} 306 // `projects/bar` has a `Policy` with values: 307 // {value: "E3" value: "E4" inherit_from_parent: true} 308 // The accepted values at `organizations/foo` are `E1`, `E2`. 309 // The accepted values at `projects/bar` are `E1`, `E2`, `E3`, and `E4`. 310 // 311 // Example 3 (inheriting both allowed and denied values): 312 // `organizations/foo` has a `Policy` with values: 313 // {allowed_values: "E1" allowed_values: "E2"} 314 // `projects/bar` has a `Policy` with: 315 // {denied_values: "E1"} 316 // The accepted values at `organizations/foo` are `E1`, `E2`. 317 // The value accepted at `projects/bar` is `E2`. 318 // 319 // Example 4 (RestoreDefault): 320 // `organizations/foo` has a `Policy` with values: 321 // {allowed_values: "E1" allowed_values:"E2"} 322 // `projects/bar` has a `Policy` with values: 323 // {RestoreDefault: {}} 324 // The accepted values at `organizations/foo` are `E1`, `E2`. 325 // The accepted values at `projects/bar` are either all or none depending on 326 // the value of `constraint_default` (if `ALLOW`, all; if 327 // `DENY`, none). 328 // 329 // Example 5 (no policy inherits parent policy): 330 // `organizations/foo` has no `Policy` set. 331 // `projects/bar` has no `Policy` set. 332 // The accepted values at both levels are either all or none depending on 333 // the value of `constraint_default` (if `ALLOW`, all; if 334 // `DENY`, none). 335 // 336 // Example 6 (ListConstraint allowing all): 337 // `organizations/foo` has a `Policy` with values: 338 // {allowed_values: "E1" allowed_values: "E2"} 339 // `projects/bar` has a `Policy` with: 340 // {all: ALLOW} 341 // The accepted values at `organizations/foo` are `E1`, E2`. 342 // Any value is accepted at `projects/bar`. 343 // 344 // Example 7 (ListConstraint allowing none): 345 // `organizations/foo` has a `Policy` with values: 346 // {allowed_values: "E1" allowed_values: "E2"} 347 // `projects/bar` has a `Policy` with: 348 // {all: DENY} 349 // The accepted values at `organizations/foo` are `E1`, E2`. 350 // No value is accepted at `projects/bar`. 351 // 352 // Example 10 (allowed and denied subtrees of Resource Manager hierarchy): 353 // Given the following resource hierarchy 354 // O1->{F1, F2}; F1->{P1}; F2->{P2, P3}, 355 // `organizations/foo` has a `Policy` with values: 356 // {allowed_values: "under:organizations/O1"} 357 // `projects/bar` has a `Policy` with: 358 // {allowed_values: "under:projects/P3"} 359 // {denied_values: "under:folders/F2"} 360 // The accepted values at `organizations/foo` are `organizations/O1`, 361 // `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`, 362 // `projects/P3`. 363 // The accepted values at `projects/bar` are `organizations/O1`, 364 // `folders/F1`, `projects/P1`. 365 InheritFromParent bool `protobuf:"varint,5,opt,name=inherit_from_parent,json=inheritFromParent,proto3" json:"inherit_from_parent,omitempty"` 366 XXX_NoUnkeyedLiteral struct{} `json:"-"` 367 XXX_unrecognized []byte `json:"-"` 368 XXX_sizecache int32 `json:"-"` 369} 370 371func (m *Policy_ListPolicy) Reset() { *m = Policy_ListPolicy{} } 372func (m *Policy_ListPolicy) String() string { return proto.CompactTextString(m) } 373func (*Policy_ListPolicy) ProtoMessage() {} 374func (*Policy_ListPolicy) Descriptor() ([]byte, []int) { 375 return fileDescriptor_fc4532988da7cf50, []int{0, 0} 376} 377 378func (m *Policy_ListPolicy) XXX_Unmarshal(b []byte) error { 379 return xxx_messageInfo_Policy_ListPolicy.Unmarshal(m, b) 380} 381func (m *Policy_ListPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 382 return xxx_messageInfo_Policy_ListPolicy.Marshal(b, m, deterministic) 383} 384func (m *Policy_ListPolicy) XXX_Merge(src proto.Message) { 385 xxx_messageInfo_Policy_ListPolicy.Merge(m, src) 386} 387func (m *Policy_ListPolicy) XXX_Size() int { 388 return xxx_messageInfo_Policy_ListPolicy.Size(m) 389} 390func (m *Policy_ListPolicy) XXX_DiscardUnknown() { 391 xxx_messageInfo_Policy_ListPolicy.DiscardUnknown(m) 392} 393 394var xxx_messageInfo_Policy_ListPolicy proto.InternalMessageInfo 395 396func (m *Policy_ListPolicy) GetAllowedValues() []string { 397 if m != nil { 398 return m.AllowedValues 399 } 400 return nil 401} 402 403func (m *Policy_ListPolicy) GetDeniedValues() []string { 404 if m != nil { 405 return m.DeniedValues 406 } 407 return nil 408} 409 410func (m *Policy_ListPolicy) GetAllValues() Policy_ListPolicy_AllValues { 411 if m != nil { 412 return m.AllValues 413 } 414 return Policy_ListPolicy_ALL_VALUES_UNSPECIFIED 415} 416 417func (m *Policy_ListPolicy) GetSuggestedValue() string { 418 if m != nil { 419 return m.SuggestedValue 420 } 421 return "" 422} 423 424func (m *Policy_ListPolicy) GetInheritFromParent() bool { 425 if m != nil { 426 return m.InheritFromParent 427 } 428 return false 429} 430 431// Used in `policy_type` to specify how `boolean_policy` will behave at this 432// resource. 433type Policy_BooleanPolicy struct { 434 // If `true`, then the `Policy` is enforced. If `false`, then any 435 // configuration is acceptable. 436 // 437 // Suppose you have a `Constraint` 438 // `constraints/compute.disableSerialPortAccess` with `constraint_default` 439 // set to `ALLOW`. A `Policy` for that `Constraint` exhibits the following 440 // behavior: 441 // - If the `Policy` at this resource has enforced set to `false`, serial 442 // port connection attempts will be allowed. 443 // - If the `Policy` at this resource has enforced set to `true`, serial 444 // port connection attempts will be refused. 445 // - If the `Policy` at this resource is `RestoreDefault`, serial port 446 // connection attempts will be allowed. 447 // - If no `Policy` is set at this resource or anywhere higher in the 448 // resource hierarchy, serial port connection attempts will be allowed. 449 // - If no `Policy` is set at this resource, but one exists higher in the 450 // resource hierarchy, the behavior is as if the`Policy` were set at 451 // this resource. 452 // 453 // The following examples demonstrate the different possible layerings: 454 // 455 // Example 1 (nearest `Constraint` wins): 456 // `organizations/foo` has a `Policy` with: 457 // {enforced: false} 458 // `projects/bar` has no `Policy` set. 459 // The constraint at `projects/bar` and `organizations/foo` will not be 460 // enforced. 461 // 462 // Example 2 (enforcement gets replaced): 463 // `organizations/foo` has a `Policy` with: 464 // {enforced: false} 465 // `projects/bar` has a `Policy` with: 466 // {enforced: true} 467 // The constraint at `organizations/foo` is not enforced. 468 // The constraint at `projects/bar` is enforced. 469 // 470 // Example 3 (RestoreDefault): 471 // `organizations/foo` has a `Policy` with: 472 // {enforced: true} 473 // `projects/bar` has a `Policy` with: 474 // {RestoreDefault: {}} 475 // The constraint at `organizations/foo` is enforced. 476 // The constraint at `projects/bar` is not enforced, because 477 // `constraint_default` for the `Constraint` is `ALLOW`. 478 Enforced bool `protobuf:"varint,1,opt,name=enforced,proto3" json:"enforced,omitempty"` 479 XXX_NoUnkeyedLiteral struct{} `json:"-"` 480 XXX_unrecognized []byte `json:"-"` 481 XXX_sizecache int32 `json:"-"` 482} 483 484func (m *Policy_BooleanPolicy) Reset() { *m = Policy_BooleanPolicy{} } 485func (m *Policy_BooleanPolicy) String() string { return proto.CompactTextString(m) } 486func (*Policy_BooleanPolicy) ProtoMessage() {} 487func (*Policy_BooleanPolicy) Descriptor() ([]byte, []int) { 488 return fileDescriptor_fc4532988da7cf50, []int{0, 1} 489} 490 491func (m *Policy_BooleanPolicy) XXX_Unmarshal(b []byte) error { 492 return xxx_messageInfo_Policy_BooleanPolicy.Unmarshal(m, b) 493} 494func (m *Policy_BooleanPolicy) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 495 return xxx_messageInfo_Policy_BooleanPolicy.Marshal(b, m, deterministic) 496} 497func (m *Policy_BooleanPolicy) XXX_Merge(src proto.Message) { 498 xxx_messageInfo_Policy_BooleanPolicy.Merge(m, src) 499} 500func (m *Policy_BooleanPolicy) XXX_Size() int { 501 return xxx_messageInfo_Policy_BooleanPolicy.Size(m) 502} 503func (m *Policy_BooleanPolicy) XXX_DiscardUnknown() { 504 xxx_messageInfo_Policy_BooleanPolicy.DiscardUnknown(m) 505} 506 507var xxx_messageInfo_Policy_BooleanPolicy proto.InternalMessageInfo 508 509func (m *Policy_BooleanPolicy) GetEnforced() bool { 510 if m != nil { 511 return m.Enforced 512 } 513 return false 514} 515 516// Ignores policies set above this resource and restores the 517// `constraint_default` enforcement behavior of the specific `Constraint` at 518// this resource. 519// 520// Suppose that `constraint_default` is set to `ALLOW` for the 521// `Constraint` `constraints/serviceuser.services`. Suppose that organization 522// foo.com sets a `Policy` at their Organization resource node that restricts 523// the allowed service activations to deny all service activations. They 524// could then set a `Policy` with the `policy_type` `restore_default` on 525// several experimental projects, restoring the `constraint_default` 526// enforcement of the `Constraint` for only those projects, allowing those 527// projects to have all services activated. 528type Policy_RestoreDefault struct { 529 XXX_NoUnkeyedLiteral struct{} `json:"-"` 530 XXX_unrecognized []byte `json:"-"` 531 XXX_sizecache int32 `json:"-"` 532} 533 534func (m *Policy_RestoreDefault) Reset() { *m = Policy_RestoreDefault{} } 535func (m *Policy_RestoreDefault) String() string { return proto.CompactTextString(m) } 536func (*Policy_RestoreDefault) ProtoMessage() {} 537func (*Policy_RestoreDefault) Descriptor() ([]byte, []int) { 538 return fileDescriptor_fc4532988da7cf50, []int{0, 2} 539} 540 541func (m *Policy_RestoreDefault) XXX_Unmarshal(b []byte) error { 542 return xxx_messageInfo_Policy_RestoreDefault.Unmarshal(m, b) 543} 544func (m *Policy_RestoreDefault) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 545 return xxx_messageInfo_Policy_RestoreDefault.Marshal(b, m, deterministic) 546} 547func (m *Policy_RestoreDefault) XXX_Merge(src proto.Message) { 548 xxx_messageInfo_Policy_RestoreDefault.Merge(m, src) 549} 550func (m *Policy_RestoreDefault) XXX_Size() int { 551 return xxx_messageInfo_Policy_RestoreDefault.Size(m) 552} 553func (m *Policy_RestoreDefault) XXX_DiscardUnknown() { 554 xxx_messageInfo_Policy_RestoreDefault.DiscardUnknown(m) 555} 556 557var xxx_messageInfo_Policy_RestoreDefault proto.InternalMessageInfo 558 559func init() { 560 proto.RegisterEnum("google.cloud.orgpolicy.v1.Policy_ListPolicy_AllValues", Policy_ListPolicy_AllValues_name, Policy_ListPolicy_AllValues_value) 561 proto.RegisterType((*Policy)(nil), "google.cloud.orgpolicy.v1.Policy") 562 proto.RegisterType((*Policy_ListPolicy)(nil), "google.cloud.orgpolicy.v1.Policy.ListPolicy") 563 proto.RegisterType((*Policy_BooleanPolicy)(nil), "google.cloud.orgpolicy.v1.Policy.BooleanPolicy") 564 proto.RegisterType((*Policy_RestoreDefault)(nil), "google.cloud.orgpolicy.v1.Policy.RestoreDefault") 565} 566 567func init() { 568 proto.RegisterFile("google/cloud/orgpolicy/v1/orgpolicy.proto", fileDescriptor_fc4532988da7cf50) 569} 570 571var fileDescriptor_fc4532988da7cf50 = []byte{ 572 // 620 bytes of a gzipped FileDescriptorProto 573 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x94, 0x54, 0xdd, 0x6e, 0xd3, 0x30, 574 0x14, 0x5e, 0xba, 0xad, 0x6b, 0x4f, 0xd7, 0xac, 0x18, 0x09, 0x65, 0x61, 0x40, 0x35, 0x84, 0x28, 575 0x02, 0x25, 0x74, 0x48, 0x5c, 0x74, 0xdc, 0xb4, 0x5b, 0xc7, 0x26, 0x55, 0x5b, 0x95, 0xb1, 0xf2, 576 0x37, 0x29, 0x72, 0x5b, 0x37, 0x44, 0x72, 0xed, 0xc8, 0x71, 0x8a, 0xf6, 0x4a, 0x5c, 0xf2, 0x10, 577 0x5c, 0x20, 0x9e, 0x84, 0xa7, 0x40, 0xb5, 0x93, 0x74, 0x45, 0x4c, 0x13, 0x77, 0x3e, 0xdf, 0xf7, 578 0x9d, 0xef, 0x1c, 0x9f, 0xe3, 0x04, 0x9e, 0x05, 0x9c, 0x07, 0x94, 0xb8, 0x23, 0xca, 0x93, 0xb1, 579 0xcb, 0x45, 0x10, 0x71, 0x1a, 0x8e, 0xae, 0xdc, 0x59, 0x73, 0x11, 0x38, 0x91, 0xe0, 0x92, 0xa3, 580 0x6d, 0x2d, 0x75, 0x94, 0xd4, 0x59, 0xb0, 0xb3, 0xa6, 0x7d, 0x3f, 0x75, 0x51, 0xc2, 0x61, 0x32, 581 0x71, 0xc9, 0x34, 0x92, 0x69, 0x9e, 0xfd, 0xe8, 0x6f, 0x52, 0x86, 0x53, 0x12, 0x4b, 0x3c, 0x8d, 582 0x52, 0xc1, 0x4e, 0x2a, 0xc0, 0x51, 0xe8, 0x62, 0xc6, 0xb8, 0xc4, 0x32, 0xe4, 0x2c, 0xd6, 0xec, 583 0xee, 0xf7, 0x22, 0x14, 0xfb, 0xaa, 0x12, 0xb2, 0x60, 0x63, 0x46, 0x44, 0x1c, 0x72, 0x66, 0x19, 584 0x75, 0xa3, 0xb1, 0xee, 0x65, 0x21, 0x7a, 0x08, 0x30, 0xe2, 0x2c, 0x96, 0x02, 0x87, 0x4c, 0x5a, 585 0x85, 0xba, 0xd1, 0x28, 0x7b, 0xd7, 0x10, 0x84, 0x60, 0x8d, 0x48, 0x1c, 0x58, 0xab, 0x75, 0xa3, 586 0xb1, 0xe9, 0xa9, 0x33, 0xda, 0x87, 0x4a, 0x12, 0x8d, 0xb1, 0x24, 0xfe, 0xbc, 0x21, 0x6b, 0xad, 587 0x6e, 0x34, 0x2a, 0x7b, 0xb6, 0x93, 0xde, 0x32, 0xeb, 0xd6, 0x79, 0x97, 0x75, 0xeb, 0x81, 0x96, 588 0xcf, 0x01, 0x74, 0x06, 0x15, 0x1a, 0xc6, 0xd2, 0xd7, 0x33, 0xb0, 0xd6, 0x55, 0xf2, 0x0b, 0xe7, 589 0xc6, 0x11, 0x39, 0xfa, 0x0a, 0x4e, 0x2f, 0x8c, 0xa5, 0x3e, 0x1e, 0xaf, 0x78, 0x40, 0xf3, 0x08, 590 0x7d, 0x00, 0x73, 0xc8, 0x39, 0x25, 0x98, 0x65, 0x9e, 0x45, 0xe5, 0xe9, 0xde, 0xee, 0xd9, 0xd1, 591 0x79, 0xb9, 0x6d, 0x75, 0x78, 0x1d, 0x40, 0x9f, 0x61, 0x4b, 0x90, 0x58, 0x72, 0x41, 0xfc, 0x31, 592 0x99, 0xe0, 0x84, 0x4a, 0x6b, 0x43, 0x59, 0xbf, 0xbc, 0xdd, 0xda, 0xd3, 0x89, 0x87, 0x3a, 0xef, 593 0x78, 0xc5, 0x33, 0xc5, 0x12, 0x62, 0xff, 0x28, 0x00, 0x2c, 0xee, 0x84, 0x9e, 0x80, 0x89, 0x29, 594 0xe5, 0x5f, 0xc9, 0xd8, 0x9f, 0x61, 0x9a, 0x90, 0xd8, 0x32, 0xea, 0xab, 0x8d, 0xb2, 0x57, 0x4d, 595 0xd1, 0x81, 0x02, 0xd1, 0x63, 0xa8, 0x8e, 0x09, 0x0b, 0x17, 0xaa, 0x82, 0x52, 0x6d, 0x6a, 0x30, 596 0x15, 0x5d, 0x00, 0x60, 0x4a, 0x33, 0xc5, 0x7c, 0x73, 0xe6, 0xde, 0xeb, 0xff, 0x99, 0xb0, 0xd3, 597 0xa6, 0x54, 0x7b, 0x79, 0x65, 0x9c, 0x1d, 0xd1, 0x53, 0xd8, 0x8a, 0x93, 0x20, 0x20, 0xb1, 0xcc, 598 0xca, 0xab, 0xd5, 0x97, 0x3d, 0x33, 0x87, 0x95, 0x12, 0x39, 0x70, 0x37, 0x64, 0x5f, 0x88, 0x08, 599 0xa5, 0x3f, 0x11, 0x7c, 0xea, 0x47, 0x58, 0x10, 0x26, 0xd5, 0xaa, 0x4b, 0xde, 0x9d, 0x94, 0x3a, 600 0x12, 0x7c, 0xda, 0x57, 0xc4, 0xee, 0x1b, 0x28, 0xe7, 0x05, 0x91, 0x0d, 0xf7, 0xda, 0xbd, 0x9e, 601 0x3f, 0x68, 0xf7, 0x2e, 0xba, 0xe7, 0xfe, 0xc5, 0xe9, 0x79, 0xbf, 0x7b, 0x70, 0x72, 0x74, 0xd2, 602 0x3d, 0xac, 0xad, 0xa0, 0x32, 0xac, 0xb7, 0x7b, 0xbd, 0xb3, 0xf7, 0x35, 0x03, 0x95, 0x60, 0xed, 603 0xb0, 0x7b, 0xfa, 0xb1, 0x56, 0xb0, 0x9f, 0x43, 0x75, 0x69, 0x8f, 0xc8, 0x86, 0x12, 0x61, 0x13, 604 0x2e, 0x46, 0x64, 0xac, 0x5e, 0x7b, 0xc9, 0xcb, 0x63, 0xbb, 0x06, 0xe6, 0xf2, 0x66, 0x3a, 0x55, 605 0xa8, 0xe8, 0x49, 0xf8, 0xf2, 0x2a, 0x22, 0x9d, 0x5f, 0x06, 0x3c, 0x18, 0xf1, 0xe9, 0xcd, 0xd3, 606 0xea, 0x98, 0x67, 0x22, 0xd0, 0x95, 0xfa, 0xf3, 0x97, 0xde, 0x37, 0x3e, 0x75, 0x52, 0x71, 0xc0, 607 0x29, 0x66, 0xc1, 0x5c, 0xed, 0x06, 0x84, 0xa9, 0xef, 0xc0, 0xd5, 0x14, 0x8e, 0xc2, 0xf8, 0x1f, 608 0x7f, 0x8a, 0xfd, 0x3c, 0xf8, 0x56, 0xd8, 0x7e, 0xab, 0x4d, 0x0e, 0x54, 0xc5, 0xbc, 0x86, 0x33, 609 0x68, 0xfe, 0xcc, 0xb8, 0x4b, 0xc5, 0x5d, 0xe6, 0xdc, 0xe5, 0xa0, 0xf9, 0xbb, 0xb0, 0xa3, 0xb9, 610 0x56, 0x4b, 0x91, 0xad, 0x56, 0xce, 0xb6, 0x5a, 0x83, 0xe6, 0xb0, 0xa8, 0xba, 0x78, 0xf5, 0x27, 611 0x00, 0x00, 0xff, 0xff, 0x06, 0x74, 0xf5, 0xa8, 0xae, 0x04, 0x00, 0x00, 612} 613