1// Copyright 2019 Google LLC. 2// 3// Licensed under the Apache License, Version 2.0 (the "License"); 4// you may not use this file except in compliance with the License. 5// You may obtain a copy of the License at 6// 7// http://www.apache.org/licenses/LICENSE-2.0 8// 9// Unless required by applicable law or agreed to in writing, software 10// distributed under the License is distributed on an "AS IS" BASIS, 11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12// See the License for the specific language governing permissions and 13// limitations under the License. 14// 15 16// Code generated by protoc-gen-go. DO NOT EDIT. 17// versions: 18// protoc-gen-go v1.26.0 19// protoc v3.12.2 20// source: google/cloud/orgpolicy/v1/orgpolicy.proto 21 22package orgpolicy 23 24import ( 25 reflect "reflect" 26 sync "sync" 27 28 _ "google.golang.org/genproto/googleapis/api/annotations" 29 protoreflect "google.golang.org/protobuf/reflect/protoreflect" 30 protoimpl "google.golang.org/protobuf/runtime/protoimpl" 31 _ "google.golang.org/protobuf/types/known/emptypb" 32 timestamppb "google.golang.org/protobuf/types/known/timestamppb" 33) 34 35const ( 36 // Verify that this generated code is sufficiently up-to-date. 37 _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) 38 // Verify that runtime/protoimpl is sufficiently up-to-date. 39 _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) 40) 41 42// This enum can be used to set `Policies` that apply to all possible 43// configuration values rather than specific values in `allowed_values` or 44// `denied_values`. 45// 46// Settting this to `ALLOW` will mean this `Policy` allows all values. 47// Similarly, setting it to `DENY` will mean no values are allowed. If 48// set to either `ALLOW` or `DENY, `allowed_values` and `denied_values` 49// must be unset. Setting this to `ALL_VALUES_UNSPECIFIED` allows for 50// setting `allowed_values` and `denied_values`. 51type Policy_ListPolicy_AllValues int32 52 53const ( 54 // Indicates that allowed_values or denied_values must be set. 55 Policy_ListPolicy_ALL_VALUES_UNSPECIFIED Policy_ListPolicy_AllValues = 0 56 // A policy with this set allows all values. 57 Policy_ListPolicy_ALLOW Policy_ListPolicy_AllValues = 1 58 // A policy with this set denies all values. 59 Policy_ListPolicy_DENY Policy_ListPolicy_AllValues = 2 60) 61 62// Enum value maps for Policy_ListPolicy_AllValues. 63var ( 64 Policy_ListPolicy_AllValues_name = map[int32]string{ 65 0: "ALL_VALUES_UNSPECIFIED", 66 1: "ALLOW", 67 2: "DENY", 68 } 69 Policy_ListPolicy_AllValues_value = map[string]int32{ 70 "ALL_VALUES_UNSPECIFIED": 0, 71 "ALLOW": 1, 72 "DENY": 2, 73 } 74) 75 76func (x Policy_ListPolicy_AllValues) Enum() *Policy_ListPolicy_AllValues { 77 p := new(Policy_ListPolicy_AllValues) 78 *p = x 79 return p 80} 81 82func (x Policy_ListPolicy_AllValues) String() string { 83 return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) 84} 85 86func (Policy_ListPolicy_AllValues) Descriptor() protoreflect.EnumDescriptor { 87 return file_google_cloud_orgpolicy_v1_orgpolicy_proto_enumTypes[0].Descriptor() 88} 89 90func (Policy_ListPolicy_AllValues) Type() protoreflect.EnumType { 91 return &file_google_cloud_orgpolicy_v1_orgpolicy_proto_enumTypes[0] 92} 93 94func (x Policy_ListPolicy_AllValues) Number() protoreflect.EnumNumber { 95 return protoreflect.EnumNumber(x) 96} 97 98// Deprecated: Use Policy_ListPolicy_AllValues.Descriptor instead. 99func (Policy_ListPolicy_AllValues) EnumDescriptor() ([]byte, []int) { 100 return file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescGZIP(), []int{0, 0, 0} 101} 102 103// Defines a Cloud Organization `Policy` which is used to specify `Constraints` 104// for configurations of Cloud Platform resources. 105type Policy struct { 106 state protoimpl.MessageState 107 sizeCache protoimpl.SizeCache 108 unknownFields protoimpl.UnknownFields 109 110 // Version of the `Policy`. Default version is 0; 111 Version int32 `protobuf:"varint,1,opt,name=version,proto3" json:"version,omitempty"` 112 // The name of the `Constraint` the `Policy` is configuring, for example, 113 // `constraints/serviceuser.services`. 114 // 115 // Immutable after creation. 116 Constraint string `protobuf:"bytes,2,opt,name=constraint,proto3" json:"constraint,omitempty"` 117 // An opaque tag indicating the current version of the `Policy`, used for 118 // concurrency control. 119 // 120 // When the `Policy` is returned from either a `GetPolicy` or a 121 // `ListOrgPolicy` request, this `etag` indicates the version of the current 122 // `Policy` to use when executing a read-modify-write loop. 123 // 124 // When the `Policy` is returned from a `GetEffectivePolicy` request, the 125 // `etag` will be unset. 126 // 127 // When the `Policy` is used in a `SetOrgPolicy` method, use the `etag` value 128 // that was returned from a `GetOrgPolicy` request as part of a 129 // read-modify-write loop for concurrency control. Not setting the `etag`in a 130 // `SetOrgPolicy` request will result in an unconditional write of the 131 // `Policy`. 132 Etag []byte `protobuf:"bytes,3,opt,name=etag,proto3" json:"etag,omitempty"` 133 // The time stamp the `Policy` was previously updated. This is set by the 134 // server, not specified by the caller, and represents the last time a call to 135 // `SetOrgPolicy` was made for that `Policy`. Any value set by the client will 136 // be ignored. 137 UpdateTime *timestamppb.Timestamp `protobuf:"bytes,4,opt,name=update_time,json=updateTime,proto3" json:"update_time,omitempty"` 138 // The field to populate is based on the `constraint_type` value in the 139 // `Constraint`. 140 // `list_constraint` => `list_policy` 141 // `boolean_constraint` => `boolean_policy` 142 // 143 // A `restore_default` message may be used with any `Constraint` type. 144 // 145 // Providing a *_policy that is incompatible with the `constraint_type` will 146 // result in an `invalid_argument` error. 147 // 148 // Attempting to set a `Policy` with a `policy_type` not set will result in an 149 // `invalid_argument` error. 150 // 151 // Types that are assignable to PolicyType: 152 // *Policy_ListPolicy_ 153 // *Policy_BooleanPolicy_ 154 // *Policy_RestoreDefault_ 155 PolicyType isPolicy_PolicyType `protobuf_oneof:"policy_type"` 156} 157 158func (x *Policy) Reset() { 159 *x = Policy{} 160 if protoimpl.UnsafeEnabled { 161 mi := &file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[0] 162 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 163 ms.StoreMessageInfo(mi) 164 } 165} 166 167func (x *Policy) String() string { 168 return protoimpl.X.MessageStringOf(x) 169} 170 171func (*Policy) ProtoMessage() {} 172 173func (x *Policy) ProtoReflect() protoreflect.Message { 174 mi := &file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[0] 175 if protoimpl.UnsafeEnabled && x != nil { 176 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 177 if ms.LoadMessageInfo() == nil { 178 ms.StoreMessageInfo(mi) 179 } 180 return ms 181 } 182 return mi.MessageOf(x) 183} 184 185// Deprecated: Use Policy.ProtoReflect.Descriptor instead. 186func (*Policy) Descriptor() ([]byte, []int) { 187 return file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescGZIP(), []int{0} 188} 189 190func (x *Policy) GetVersion() int32 { 191 if x != nil { 192 return x.Version 193 } 194 return 0 195} 196 197func (x *Policy) GetConstraint() string { 198 if x != nil { 199 return x.Constraint 200 } 201 return "" 202} 203 204func (x *Policy) GetEtag() []byte { 205 if x != nil { 206 return x.Etag 207 } 208 return nil 209} 210 211func (x *Policy) GetUpdateTime() *timestamppb.Timestamp { 212 if x != nil { 213 return x.UpdateTime 214 } 215 return nil 216} 217 218func (m *Policy) GetPolicyType() isPolicy_PolicyType { 219 if m != nil { 220 return m.PolicyType 221 } 222 return nil 223} 224 225func (x *Policy) GetListPolicy() *Policy_ListPolicy { 226 if x, ok := x.GetPolicyType().(*Policy_ListPolicy_); ok { 227 return x.ListPolicy 228 } 229 return nil 230} 231 232func (x *Policy) GetBooleanPolicy() *Policy_BooleanPolicy { 233 if x, ok := x.GetPolicyType().(*Policy_BooleanPolicy_); ok { 234 return x.BooleanPolicy 235 } 236 return nil 237} 238 239func (x *Policy) GetRestoreDefault() *Policy_RestoreDefault { 240 if x, ok := x.GetPolicyType().(*Policy_RestoreDefault_); ok { 241 return x.RestoreDefault 242 } 243 return nil 244} 245 246type isPolicy_PolicyType interface { 247 isPolicy_PolicyType() 248} 249 250type Policy_ListPolicy_ struct { 251 // List of values either allowed or disallowed. 252 ListPolicy *Policy_ListPolicy `protobuf:"bytes,5,opt,name=list_policy,json=listPolicy,proto3,oneof"` 253} 254 255type Policy_BooleanPolicy_ struct { 256 // For boolean `Constraints`, whether to enforce the `Constraint` or not. 257 BooleanPolicy *Policy_BooleanPolicy `protobuf:"bytes,6,opt,name=boolean_policy,json=booleanPolicy,proto3,oneof"` 258} 259 260type Policy_RestoreDefault_ struct { 261 // Restores the default behavior of the constraint; independent of 262 // `Constraint` type. 263 RestoreDefault *Policy_RestoreDefault `protobuf:"bytes,7,opt,name=restore_default,json=restoreDefault,proto3,oneof"` 264} 265 266func (*Policy_ListPolicy_) isPolicy_PolicyType() {} 267 268func (*Policy_BooleanPolicy_) isPolicy_PolicyType() {} 269 270func (*Policy_RestoreDefault_) isPolicy_PolicyType() {} 271 272// Used in `policy_type` to specify how `list_policy` behaves at this 273// resource. 274// 275// `ListPolicy` can define specific values and subtrees of Cloud Resource 276// Manager resource hierarchy (`Organizations`, `Folders`, `Projects`) that 277// are allowed or denied by setting the `allowed_values` and `denied_values` 278// fields. This is achieved by using the `under:` and optional `is:` prefixes. 279// The `under:` prefix is used to denote resource subtree values. 280// The `is:` prefix is used to denote specific values, and is required only 281// if the value contains a ":". Values prefixed with "is:" are treated the 282// same as values with no prefix. 283// Ancestry subtrees must be in one of the following formats: 284// - "projects/<project-id>", e.g. "projects/tokyo-rain-123" 285// - "folders/<folder-id>", e.g. "folders/1234" 286// - "organizations/<organization-id>", e.g. "organizations/1234" 287// The `supports_under` field of the associated `Constraint` defines whether 288// ancestry prefixes can be used. You can set `allowed_values` and 289// `denied_values` in the same `Policy` if `all_values` is 290// `ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all 291// values. If `all_values` is set to either `ALLOW` or `DENY`, 292// `allowed_values` and `denied_values` must be unset. 293type Policy_ListPolicy struct { 294 state protoimpl.MessageState 295 sizeCache protoimpl.SizeCache 296 unknownFields protoimpl.UnknownFields 297 298 // List of values allowed at this resource. Can only be set if `all_values` 299 // is set to `ALL_VALUES_UNSPECIFIED`. 300 AllowedValues []string `protobuf:"bytes,1,rep,name=allowed_values,json=allowedValues,proto3" json:"allowed_values,omitempty"` 301 // List of values denied at this resource. Can only be set if `all_values` 302 // is set to `ALL_VALUES_UNSPECIFIED`. 303 DeniedValues []string `protobuf:"bytes,2,rep,name=denied_values,json=deniedValues,proto3" json:"denied_values,omitempty"` 304 // The policy all_values state. 305 AllValues Policy_ListPolicy_AllValues `protobuf:"varint,3,opt,name=all_values,json=allValues,proto3,enum=google.cloud.orgpolicy.v1.Policy_ListPolicy_AllValues" json:"all_values,omitempty"` 306 // Optional. The Google Cloud Console will try to default to a configuration 307 // that matches the value specified in this `Policy`. If `suggested_value` 308 // is not set, it will inherit the value specified higher in the hierarchy, 309 // unless `inherit_from_parent` is `false`. 310 SuggestedValue string `protobuf:"bytes,4,opt,name=suggested_value,json=suggestedValue,proto3" json:"suggested_value,omitempty"` 311 // Determines the inheritance behavior for this `Policy`. 312 // 313 // By default, a `ListPolicy` set at a resource supercedes any `Policy` set 314 // anywhere up the resource hierarchy. However, if `inherit_from_parent` is 315 // set to `true`, then the values from the effective `Policy` of the parent 316 // resource are inherited, meaning the values set in this `Policy` are 317 // added to the values inherited up the hierarchy. 318 // 319 // Setting `Policy` hierarchies that inherit both allowed values and denied 320 // values isn't recommended in most circumstances to keep the configuration 321 // simple and understandable. However, it is possible to set a `Policy` with 322 // `allowed_values` set that inherits a `Policy` with `denied_values` set. 323 // In this case, the values that are allowed must be in `allowed_values` and 324 // not present in `denied_values`. 325 // 326 // For example, suppose you have a `Constraint` 327 // `constraints/serviceuser.services`, which has a `constraint_type` of 328 // `list_constraint`, and with `constraint_default` set to `ALLOW`. 329 // Suppose that at the Organization level, a `Policy` is applied that 330 // restricts the allowed API activations to {`E1`, `E2`}. Then, if a 331 // `Policy` is applied to a project below the Organization that has 332 // `inherit_from_parent` set to `false` and field all_values set to DENY, 333 // then an attempt to activate any API will be denied. 334 // 335 // The following examples demonstrate different possible layerings for 336 // `projects/bar` parented by `organizations/foo`: 337 // 338 // Example 1 (no inherited values): 339 // `organizations/foo` has a `Policy` with values: 340 // {allowed_values: "E1" allowed_values:"E2"} 341 // `projects/bar` has `inherit_from_parent` `false` and values: 342 // {allowed_values: "E3" allowed_values: "E4"} 343 // The accepted values at `organizations/foo` are `E1`, `E2`. 344 // The accepted values at `projects/bar` are `E3`, and `E4`. 345 // 346 // Example 2 (inherited values): 347 // `organizations/foo` has a `Policy` with values: 348 // {allowed_values: "E1" allowed_values:"E2"} 349 // `projects/bar` has a `Policy` with values: 350 // {value: "E3" value: "E4" inherit_from_parent: true} 351 // The accepted values at `organizations/foo` are `E1`, `E2`. 352 // The accepted values at `projects/bar` are `E1`, `E2`, `E3`, and `E4`. 353 // 354 // Example 3 (inheriting both allowed and denied values): 355 // `organizations/foo` has a `Policy` with values: 356 // {allowed_values: "E1" allowed_values: "E2"} 357 // `projects/bar` has a `Policy` with: 358 // {denied_values: "E1"} 359 // The accepted values at `organizations/foo` are `E1`, `E2`. 360 // The value accepted at `projects/bar` is `E2`. 361 // 362 // Example 4 (RestoreDefault): 363 // `organizations/foo` has a `Policy` with values: 364 // {allowed_values: "E1" allowed_values:"E2"} 365 // `projects/bar` has a `Policy` with values: 366 // {RestoreDefault: {}} 367 // The accepted values at `organizations/foo` are `E1`, `E2`. 368 // The accepted values at `projects/bar` are either all or none depending on 369 // the value of `constraint_default` (if `ALLOW`, all; if 370 // `DENY`, none). 371 // 372 // Example 5 (no policy inherits parent policy): 373 // `organizations/foo` has no `Policy` set. 374 // `projects/bar` has no `Policy` set. 375 // The accepted values at both levels are either all or none depending on 376 // the value of `constraint_default` (if `ALLOW`, all; if 377 // `DENY`, none). 378 // 379 // Example 6 (ListConstraint allowing all): 380 // `organizations/foo` has a `Policy` with values: 381 // {allowed_values: "E1" allowed_values: "E2"} 382 // `projects/bar` has a `Policy` with: 383 // {all: ALLOW} 384 // The accepted values at `organizations/foo` are `E1`, E2`. 385 // Any value is accepted at `projects/bar`. 386 // 387 // Example 7 (ListConstraint allowing none): 388 // `organizations/foo` has a `Policy` with values: 389 // {allowed_values: "E1" allowed_values: "E2"} 390 // `projects/bar` has a `Policy` with: 391 // {all: DENY} 392 // The accepted values at `organizations/foo` are `E1`, E2`. 393 // No value is accepted at `projects/bar`. 394 // 395 // Example 10 (allowed and denied subtrees of Resource Manager hierarchy): 396 // Given the following resource hierarchy 397 // O1->{F1, F2}; F1->{P1}; F2->{P2, P3}, 398 // `organizations/foo` has a `Policy` with values: 399 // {allowed_values: "under:organizations/O1"} 400 // `projects/bar` has a `Policy` with: 401 // {allowed_values: "under:projects/P3"} 402 // {denied_values: "under:folders/F2"} 403 // The accepted values at `organizations/foo` are `organizations/O1`, 404 // `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`, 405 // `projects/P3`. 406 // The accepted values at `projects/bar` are `organizations/O1`, 407 // `folders/F1`, `projects/P1`. 408 InheritFromParent bool `protobuf:"varint,5,opt,name=inherit_from_parent,json=inheritFromParent,proto3" json:"inherit_from_parent,omitempty"` 409} 410 411func (x *Policy_ListPolicy) Reset() { 412 *x = Policy_ListPolicy{} 413 if protoimpl.UnsafeEnabled { 414 mi := &file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[1] 415 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 416 ms.StoreMessageInfo(mi) 417 } 418} 419 420func (x *Policy_ListPolicy) String() string { 421 return protoimpl.X.MessageStringOf(x) 422} 423 424func (*Policy_ListPolicy) ProtoMessage() {} 425 426func (x *Policy_ListPolicy) ProtoReflect() protoreflect.Message { 427 mi := &file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[1] 428 if protoimpl.UnsafeEnabled && x != nil { 429 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 430 if ms.LoadMessageInfo() == nil { 431 ms.StoreMessageInfo(mi) 432 } 433 return ms 434 } 435 return mi.MessageOf(x) 436} 437 438// Deprecated: Use Policy_ListPolicy.ProtoReflect.Descriptor instead. 439func (*Policy_ListPolicy) Descriptor() ([]byte, []int) { 440 return file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescGZIP(), []int{0, 0} 441} 442 443func (x *Policy_ListPolicy) GetAllowedValues() []string { 444 if x != nil { 445 return x.AllowedValues 446 } 447 return nil 448} 449 450func (x *Policy_ListPolicy) GetDeniedValues() []string { 451 if x != nil { 452 return x.DeniedValues 453 } 454 return nil 455} 456 457func (x *Policy_ListPolicy) GetAllValues() Policy_ListPolicy_AllValues { 458 if x != nil { 459 return x.AllValues 460 } 461 return Policy_ListPolicy_ALL_VALUES_UNSPECIFIED 462} 463 464func (x *Policy_ListPolicy) GetSuggestedValue() string { 465 if x != nil { 466 return x.SuggestedValue 467 } 468 return "" 469} 470 471func (x *Policy_ListPolicy) GetInheritFromParent() bool { 472 if x != nil { 473 return x.InheritFromParent 474 } 475 return false 476} 477 478// Used in `policy_type` to specify how `boolean_policy` will behave at this 479// resource. 480type Policy_BooleanPolicy struct { 481 state protoimpl.MessageState 482 sizeCache protoimpl.SizeCache 483 unknownFields protoimpl.UnknownFields 484 485 // If `true`, then the `Policy` is enforced. If `false`, then any 486 // configuration is acceptable. 487 // 488 // Suppose you have a `Constraint` 489 // `constraints/compute.disableSerialPortAccess` with `constraint_default` 490 // set to `ALLOW`. A `Policy` for that `Constraint` exhibits the following 491 // behavior: 492 // - If the `Policy` at this resource has enforced set to `false`, serial 493 // port connection attempts will be allowed. 494 // - If the `Policy` at this resource has enforced set to `true`, serial 495 // port connection attempts will be refused. 496 // - If the `Policy` at this resource is `RestoreDefault`, serial port 497 // connection attempts will be allowed. 498 // - If no `Policy` is set at this resource or anywhere higher in the 499 // resource hierarchy, serial port connection attempts will be allowed. 500 // - If no `Policy` is set at this resource, but one exists higher in the 501 // resource hierarchy, the behavior is as if the`Policy` were set at 502 // this resource. 503 // 504 // The following examples demonstrate the different possible layerings: 505 // 506 // Example 1 (nearest `Constraint` wins): 507 // `organizations/foo` has a `Policy` with: 508 // {enforced: false} 509 // `projects/bar` has no `Policy` set. 510 // The constraint at `projects/bar` and `organizations/foo` will not be 511 // enforced. 512 // 513 // Example 2 (enforcement gets replaced): 514 // `organizations/foo` has a `Policy` with: 515 // {enforced: false} 516 // `projects/bar` has a `Policy` with: 517 // {enforced: true} 518 // The constraint at `organizations/foo` is not enforced. 519 // The constraint at `projects/bar` is enforced. 520 // 521 // Example 3 (RestoreDefault): 522 // `organizations/foo` has a `Policy` with: 523 // {enforced: true} 524 // `projects/bar` has a `Policy` with: 525 // {RestoreDefault: {}} 526 // The constraint at `organizations/foo` is enforced. 527 // The constraint at `projects/bar` is not enforced, because 528 // `constraint_default` for the `Constraint` is `ALLOW`. 529 Enforced bool `protobuf:"varint,1,opt,name=enforced,proto3" json:"enforced,omitempty"` 530} 531 532func (x *Policy_BooleanPolicy) Reset() { 533 *x = Policy_BooleanPolicy{} 534 if protoimpl.UnsafeEnabled { 535 mi := &file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[2] 536 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 537 ms.StoreMessageInfo(mi) 538 } 539} 540 541func (x *Policy_BooleanPolicy) String() string { 542 return protoimpl.X.MessageStringOf(x) 543} 544 545func (*Policy_BooleanPolicy) ProtoMessage() {} 546 547func (x *Policy_BooleanPolicy) ProtoReflect() protoreflect.Message { 548 mi := &file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[2] 549 if protoimpl.UnsafeEnabled && x != nil { 550 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 551 if ms.LoadMessageInfo() == nil { 552 ms.StoreMessageInfo(mi) 553 } 554 return ms 555 } 556 return mi.MessageOf(x) 557} 558 559// Deprecated: Use Policy_BooleanPolicy.ProtoReflect.Descriptor instead. 560func (*Policy_BooleanPolicy) Descriptor() ([]byte, []int) { 561 return file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescGZIP(), []int{0, 1} 562} 563 564func (x *Policy_BooleanPolicy) GetEnforced() bool { 565 if x != nil { 566 return x.Enforced 567 } 568 return false 569} 570 571// Ignores policies set above this resource and restores the 572// `constraint_default` enforcement behavior of the specific `Constraint` at 573// this resource. 574// 575// Suppose that `constraint_default` is set to `ALLOW` for the 576// `Constraint` `constraints/serviceuser.services`. Suppose that organization 577// foo.com sets a `Policy` at their Organization resource node that restricts 578// the allowed service activations to deny all service activations. They 579// could then set a `Policy` with the `policy_type` `restore_default` on 580// several experimental projects, restoring the `constraint_default` 581// enforcement of the `Constraint` for only those projects, allowing those 582// projects to have all services activated. 583type Policy_RestoreDefault struct { 584 state protoimpl.MessageState 585 sizeCache protoimpl.SizeCache 586 unknownFields protoimpl.UnknownFields 587} 588 589func (x *Policy_RestoreDefault) Reset() { 590 *x = Policy_RestoreDefault{} 591 if protoimpl.UnsafeEnabled { 592 mi := &file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[3] 593 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 594 ms.StoreMessageInfo(mi) 595 } 596} 597 598func (x *Policy_RestoreDefault) String() string { 599 return protoimpl.X.MessageStringOf(x) 600} 601 602func (*Policy_RestoreDefault) ProtoMessage() {} 603 604func (x *Policy_RestoreDefault) ProtoReflect() protoreflect.Message { 605 mi := &file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[3] 606 if protoimpl.UnsafeEnabled && x != nil { 607 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 608 if ms.LoadMessageInfo() == nil { 609 ms.StoreMessageInfo(mi) 610 } 611 return ms 612 } 613 return mi.MessageOf(x) 614} 615 616// Deprecated: Use Policy_RestoreDefault.ProtoReflect.Descriptor instead. 617func (*Policy_RestoreDefault) Descriptor() ([]byte, []int) { 618 return file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescGZIP(), []int{0, 2} 619} 620 621var File_google_cloud_orgpolicy_v1_orgpolicy_proto protoreflect.FileDescriptor 622 623var file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDesc = []byte{ 624 0x0a, 0x29, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2f, 0x6f, 625 0x72, 0x67, 0x70, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2f, 0x76, 0x31, 0x2f, 0x6f, 0x72, 0x67, 0x70, 626 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x19, 0x67, 0x6f, 0x6f, 627 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x6f, 0x72, 0x67, 0x70, 0x6f, 0x6c, 628 0x69, 0x63, 0x79, 0x2e, 0x76, 0x31, 0x1a, 0x1b, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 629 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x65, 0x6d, 0x70, 0x74, 0x79, 0x2e, 0x70, 0x72, 630 0x6f, 0x74, 0x6f, 0x1a, 0x1f, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 631 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x74, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x2e, 0x70, 632 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1c, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x61, 0x70, 0x69, 633 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2e, 0x70, 0x72, 0x6f, 634 0x74, 0x6f, 0x22, 0xb2, 0x06, 0x0a, 0x06, 0x50, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x12, 0x18, 0x0a, 635 0x07, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x05, 0x52, 0x07, 636 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x1e, 0x0a, 0x0a, 0x63, 0x6f, 0x6e, 0x73, 0x74, 637 0x72, 0x61, 0x69, 0x6e, 0x74, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0a, 0x63, 0x6f, 0x6e, 638 0x73, 0x74, 0x72, 0x61, 0x69, 0x6e, 0x74, 0x12, 0x12, 0x0a, 0x04, 0x65, 0x74, 0x61, 0x67, 0x18, 639 0x03, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x04, 0x65, 0x74, 0x61, 0x67, 0x12, 0x3b, 0x0a, 0x0b, 0x75, 640 0x70, 0x64, 0x61, 0x74, 0x65, 0x5f, 0x74, 0x69, 0x6d, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0b, 641 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 642 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x52, 0x0a, 0x75, 0x70, 643 0x64, 0x61, 0x74, 0x65, 0x54, 0x69, 0x6d, 0x65, 0x12, 0x4f, 0x0a, 0x0b, 0x6c, 0x69, 0x73, 0x74, 644 0x5f, 0x70, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x18, 0x05, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x2c, 0x2e, 645 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x6f, 0x72, 0x67, 646 0x70, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2e, 0x76, 0x31, 0x2e, 0x50, 0x6f, 0x6c, 0x69, 0x63, 0x79, 647 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x50, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x48, 0x00, 0x52, 0x0a, 0x6c, 648 0x69, 0x73, 0x74, 0x50, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x12, 0x58, 0x0a, 0x0e, 0x62, 0x6f, 0x6f, 649 0x6c, 0x65, 0x61, 0x6e, 0x5f, 0x70, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x18, 0x06, 0x20, 0x01, 0x28, 650 0x0b, 0x32, 0x2f, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 651 0x2e, 0x6f, 0x72, 0x67, 0x70, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2e, 0x76, 0x31, 0x2e, 0x50, 0x6f, 652 0x6c, 0x69, 0x63, 0x79, 0x2e, 0x42, 0x6f, 0x6f, 0x6c, 0x65, 0x61, 0x6e, 0x50, 0x6f, 0x6c, 0x69, 653 0x63, 0x79, 0x48, 0x00, 0x52, 0x0d, 0x62, 0x6f, 0x6f, 0x6c, 0x65, 0x61, 0x6e, 0x50, 0x6f, 0x6c, 654 0x69, 0x63, 0x79, 0x12, 0x5b, 0x0a, 0x0f, 0x72, 0x65, 0x73, 0x74, 0x6f, 0x72, 0x65, 0x5f, 0x64, 655 0x65, 0x66, 0x61, 0x75, 0x6c, 0x74, 0x18, 0x07, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x30, 0x2e, 0x67, 656 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x6f, 0x72, 0x67, 0x70, 657 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2e, 0x76, 0x31, 0x2e, 0x50, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2e, 658 0x52, 0x65, 0x73, 0x74, 0x6f, 0x72, 0x65, 0x44, 0x65, 0x66, 0x61, 0x75, 0x6c, 0x74, 0x48, 0x00, 659 0x52, 0x0e, 0x72, 0x65, 0x73, 0x74, 0x6f, 0x72, 0x65, 0x44, 0x65, 0x66, 0x61, 0x75, 0x6c, 0x74, 660 0x1a, 0xc6, 0x02, 0x0a, 0x0a, 0x4c, 0x69, 0x73, 0x74, 0x50, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x12, 661 0x25, 0x0a, 0x0e, 0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x65, 0x64, 0x5f, 0x76, 0x61, 0x6c, 0x75, 0x65, 662 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x09, 0x52, 0x0d, 0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x65, 0x64, 663 0x56, 0x61, 0x6c, 0x75, 0x65, 0x73, 0x12, 0x23, 0x0a, 0x0d, 0x64, 0x65, 0x6e, 0x69, 0x65, 0x64, 664 0x5f, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x73, 0x18, 0x02, 0x20, 0x03, 0x28, 0x09, 0x52, 0x0c, 0x64, 665 0x65, 0x6e, 0x69, 0x65, 0x64, 0x56, 0x61, 0x6c, 0x75, 0x65, 0x73, 0x12, 0x55, 0x0a, 0x0a, 0x61, 666 0x6c, 0x6c, 0x5f, 0x76, 0x61, 0x6c, 0x75, 0x65, 0x73, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0e, 0x32, 667 0x36, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x6f, 668 0x72, 0x67, 0x70, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2e, 0x76, 0x31, 0x2e, 0x50, 0x6f, 0x6c, 0x69, 669 0x63, 0x79, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x50, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2e, 0x41, 0x6c, 670 0x6c, 0x56, 0x61, 0x6c, 0x75, 0x65, 0x73, 0x52, 0x09, 0x61, 0x6c, 0x6c, 0x56, 0x61, 0x6c, 0x75, 671 0x65, 0x73, 0x12, 0x27, 0x0a, 0x0f, 0x73, 0x75, 0x67, 0x67, 0x65, 0x73, 0x74, 0x65, 0x64, 0x5f, 672 0x76, 0x61, 0x6c, 0x75, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0e, 0x73, 0x75, 0x67, 673 0x67, 0x65, 0x73, 0x74, 0x65, 0x64, 0x56, 0x61, 0x6c, 0x75, 0x65, 0x12, 0x2e, 0x0a, 0x13, 0x69, 674 0x6e, 0x68, 0x65, 0x72, 0x69, 0x74, 0x5f, 0x66, 0x72, 0x6f, 0x6d, 0x5f, 0x70, 0x61, 0x72, 0x65, 675 0x6e, 0x74, 0x18, 0x05, 0x20, 0x01, 0x28, 0x08, 0x52, 0x11, 0x69, 0x6e, 0x68, 0x65, 0x72, 0x69, 676 0x74, 0x46, 0x72, 0x6f, 0x6d, 0x50, 0x61, 0x72, 0x65, 0x6e, 0x74, 0x22, 0x3c, 0x0a, 0x09, 0x41, 677 0x6c, 0x6c, 0x56, 0x61, 0x6c, 0x75, 0x65, 0x73, 0x12, 0x1a, 0x0a, 0x16, 0x41, 0x4c, 0x4c, 0x5f, 678 0x56, 0x41, 0x4c, 0x55, 0x45, 0x53, 0x5f, 0x55, 0x4e, 0x53, 0x50, 0x45, 0x43, 0x49, 0x46, 0x49, 679 0x45, 0x44, 0x10, 0x00, 0x12, 0x09, 0x0a, 0x05, 0x41, 0x4c, 0x4c, 0x4f, 0x57, 0x10, 0x01, 0x12, 680 0x08, 0x0a, 0x04, 0x44, 0x45, 0x4e, 0x59, 0x10, 0x02, 0x1a, 0x2b, 0x0a, 0x0d, 0x42, 0x6f, 0x6f, 681 0x6c, 0x65, 0x61, 0x6e, 0x50, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x12, 0x1a, 0x0a, 0x08, 0x65, 0x6e, 682 0x66, 0x6f, 0x72, 0x63, 0x65, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, 0x08, 0x52, 0x08, 0x65, 0x6e, 683 0x66, 0x6f, 0x72, 0x63, 0x65, 0x64, 0x1a, 0x10, 0x0a, 0x0e, 0x52, 0x65, 0x73, 0x74, 0x6f, 0x72, 684 0x65, 0x44, 0x65, 0x66, 0x61, 0x75, 0x6c, 0x74, 0x42, 0x0d, 0x0a, 0x0b, 0x70, 0x6f, 0x6c, 0x69, 685 0x63, 0x79, 0x5f, 0x74, 0x79, 0x70, 0x65, 0x42, 0xcc, 0x01, 0x0a, 0x1d, 0x63, 0x6f, 0x6d, 0x2e, 686 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x6f, 0x72, 0x67, 687 0x70, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2e, 0x76, 0x31, 0x42, 0x0e, 0x4f, 0x72, 0x67, 0x50, 0x6f, 688 0x6c, 0x69, 0x63, 0x79, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x50, 0x01, 0x5a, 0x42, 0x67, 0x6f, 0x6f, 689 0x67, 0x6c, 0x65, 0x2e, 0x67, 0x6f, 0x6c, 0x61, 0x6e, 0x67, 0x2e, 0x6f, 0x72, 0x67, 0x2f, 0x67, 690 0x65, 0x6e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x2f, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x61, 0x70, 691 0x69, 0x73, 0x2f, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x2f, 0x6f, 0x72, 0x67, 0x70, 0x6f, 0x6c, 0x69, 692 0x63, 0x79, 0x2f, 0x76, 0x31, 0x3b, 0x6f, 0x72, 0x67, 0x70, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0xaa, 693 0x02, 0x19, 0x47, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x43, 0x6c, 0x6f, 0x75, 0x64, 0x2e, 0x4f, 694 0x72, 0x67, 0x50, 0x6f, 0x6c, 0x69, 0x63, 0x79, 0x2e, 0x56, 0x31, 0xca, 0x02, 0x19, 0x47, 0x6f, 695 0x6f, 0x67, 0x6c, 0x65, 0x5c, 0x43, 0x6c, 0x6f, 0x75, 0x64, 0x5c, 0x4f, 0x72, 0x67, 0x50, 0x6f, 696 0x6c, 0x69, 0x63, 0x79, 0x5c, 0x56, 0x31, 0xea, 0x02, 0x1c, 0x47, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 697 0x3a, 0x3a, 0x43, 0x6c, 0x6f, 0x75, 0x64, 0x3a, 0x3a, 0x4f, 0x72, 0x67, 0x50, 0x6f, 0x6c, 0x69, 698 0x63, 0x79, 0x3a, 0x3a, 0x56, 0x31, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, 699} 700 701var ( 702 file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescOnce sync.Once 703 file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescData = file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDesc 704) 705 706func file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescGZIP() []byte { 707 file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescOnce.Do(func() { 708 file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescData = protoimpl.X.CompressGZIP(file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescData) 709 }) 710 return file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDescData 711} 712 713var file_google_cloud_orgpolicy_v1_orgpolicy_proto_enumTypes = make([]protoimpl.EnumInfo, 1) 714var file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes = make([]protoimpl.MessageInfo, 4) 715var file_google_cloud_orgpolicy_v1_orgpolicy_proto_goTypes = []interface{}{ 716 (Policy_ListPolicy_AllValues)(0), // 0: google.cloud.orgpolicy.v1.Policy.ListPolicy.AllValues 717 (*Policy)(nil), // 1: google.cloud.orgpolicy.v1.Policy 718 (*Policy_ListPolicy)(nil), // 2: google.cloud.orgpolicy.v1.Policy.ListPolicy 719 (*Policy_BooleanPolicy)(nil), // 3: google.cloud.orgpolicy.v1.Policy.BooleanPolicy 720 (*Policy_RestoreDefault)(nil), // 4: google.cloud.orgpolicy.v1.Policy.RestoreDefault 721 (*timestamppb.Timestamp)(nil), // 5: google.protobuf.Timestamp 722} 723var file_google_cloud_orgpolicy_v1_orgpolicy_proto_depIdxs = []int32{ 724 5, // 0: google.cloud.orgpolicy.v1.Policy.update_time:type_name -> google.protobuf.Timestamp 725 2, // 1: google.cloud.orgpolicy.v1.Policy.list_policy:type_name -> google.cloud.orgpolicy.v1.Policy.ListPolicy 726 3, // 2: google.cloud.orgpolicy.v1.Policy.boolean_policy:type_name -> google.cloud.orgpolicy.v1.Policy.BooleanPolicy 727 4, // 3: google.cloud.orgpolicy.v1.Policy.restore_default:type_name -> google.cloud.orgpolicy.v1.Policy.RestoreDefault 728 0, // 4: google.cloud.orgpolicy.v1.Policy.ListPolicy.all_values:type_name -> google.cloud.orgpolicy.v1.Policy.ListPolicy.AllValues 729 5, // [5:5] is the sub-list for method output_type 730 5, // [5:5] is the sub-list for method input_type 731 5, // [5:5] is the sub-list for extension type_name 732 5, // [5:5] is the sub-list for extension extendee 733 0, // [0:5] is the sub-list for field type_name 734} 735 736func init() { file_google_cloud_orgpolicy_v1_orgpolicy_proto_init() } 737func file_google_cloud_orgpolicy_v1_orgpolicy_proto_init() { 738 if File_google_cloud_orgpolicy_v1_orgpolicy_proto != nil { 739 return 740 } 741 if !protoimpl.UnsafeEnabled { 742 file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { 743 switch v := v.(*Policy); i { 744 case 0: 745 return &v.state 746 case 1: 747 return &v.sizeCache 748 case 2: 749 return &v.unknownFields 750 default: 751 return nil 752 } 753 } 754 file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { 755 switch v := v.(*Policy_ListPolicy); i { 756 case 0: 757 return &v.state 758 case 1: 759 return &v.sizeCache 760 case 2: 761 return &v.unknownFields 762 default: 763 return nil 764 } 765 } 766 file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { 767 switch v := v.(*Policy_BooleanPolicy); i { 768 case 0: 769 return &v.state 770 case 1: 771 return &v.sizeCache 772 case 2: 773 return &v.unknownFields 774 default: 775 return nil 776 } 777 } 778 file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { 779 switch v := v.(*Policy_RestoreDefault); i { 780 case 0: 781 return &v.state 782 case 1: 783 return &v.sizeCache 784 case 2: 785 return &v.unknownFields 786 default: 787 return nil 788 } 789 } 790 } 791 file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes[0].OneofWrappers = []interface{}{ 792 (*Policy_ListPolicy_)(nil), 793 (*Policy_BooleanPolicy_)(nil), 794 (*Policy_RestoreDefault_)(nil), 795 } 796 type x struct{} 797 out := protoimpl.TypeBuilder{ 798 File: protoimpl.DescBuilder{ 799 GoPackagePath: reflect.TypeOf(x{}).PkgPath(), 800 RawDescriptor: file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDesc, 801 NumEnums: 1, 802 NumMessages: 4, 803 NumExtensions: 0, 804 NumServices: 0, 805 }, 806 GoTypes: file_google_cloud_orgpolicy_v1_orgpolicy_proto_goTypes, 807 DependencyIndexes: file_google_cloud_orgpolicy_v1_orgpolicy_proto_depIdxs, 808 EnumInfos: file_google_cloud_orgpolicy_v1_orgpolicy_proto_enumTypes, 809 MessageInfos: file_google_cloud_orgpolicy_v1_orgpolicy_proto_msgTypes, 810 }.Build() 811 File_google_cloud_orgpolicy_v1_orgpolicy_proto = out.File 812 file_google_cloud_orgpolicy_v1_orgpolicy_proto_rawDesc = nil 813 file_google_cloud_orgpolicy_v1_orgpolicy_proto_goTypes = nil 814 file_google_cloud_orgpolicy_v1_orgpolicy_proto_depIdxs = nil 815} 816