@@ -99,103 +99,104 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
9999 + "google/api/resource.proto\032 *google/cloud/"
100100 + "orgpolicy/v2/constraint.proto\032 \033 google/pr"
101101 + "otobuf/empty.proto\032 \037 google/protobuf/time"
102- + "stamp.proto\032 \026 google/type/expr.proto\" \265 \002 \n \006 "
102+ + "stamp.proto\032 \026 google/type/expr.proto\" \271 \002 \n \006 "
103103 + "Policy\022 \021 \n \004 name\030 \001 \001 (\t B\003 \340 A\005 \022 3\n \004 spec\030 \002 \001 (\013 2"
104- + "%.google.cloud.orgpolicy.v2.PolicySpec\022 A "
104+ + "%.google.cloud.orgpolicy.v2.PolicySpec\022 E "
105105 + "\n \t alternate\030 \003 \001 (\013 2..google.cloud.orgpoli"
106- + "cy.v2.AlternatePolicySpec:\237 \001 \352 A\233 \001 \n \037 orgpol"
107- + "icy.googleapis.com/Policy\022 $projects/{pro"
108- + "ject}/policies/{policy}\022 \" folders/{folder"
109- + "}/policies/{policy}\022 .organizations/{orga"
110- + "nization}/policies/{policy}\" Z\n \023 Alternate"
111- + "PolicySpec\022 \016 \n \006 launch\030 \001 \001 (\t \022 3\n \004 spec\030 \002 \001 (\013 "
112- + "2%.google.cloud.orgpolicy.v2.PolicySpec\" "
113- + "\306 \003 \n \n PolicySpec\022 \014 \n \004 etag\030 \001 \001 (\t \022 4\n \013 update_t"
114- + "ime\030 \002 \001 (\013 2\032 .google.protobuf.TimestampB\003 \340 "
115- + "A\003 \022 ?\n \005 rules\030 \003 \003 (\013 20.google.cloud.orgpoli"
116- + "cy.v2.PolicySpec.PolicyRule\022 \033 \n \023 inherit_f"
117- + "rom_parent\030 \004 \001 (\010 \022 \r \n \005 reset\030 \005 \001 (\010 \032 \206 \002 \n \n Poli"
118- + "cyRule\022 O\n \006 values\030 \001 \001 (\013 2=.google.cloud.or"
119- + "gpolicy.v2.PolicySpec.PolicyRule.StringV"
120- + "aluesH\000 \022 \023 \n \t allow_all\030 \002 \001 (\010 H\000 \022 \022 \n \010 deny_all"
121- + "\030 \003 \001 (\010 H\000 \022 \021 \n \007 enforce\030 \004 \001 (\010 H\000 \022 $\n \t condition"
122- + "\030 \005 \001 (\013 2\021 .google.type.Expr\032 =\n \014 StringValue"
123- + "s\022 \026 \n \016 allowed_values\030 \001 \003 (\t \022 \025 \n \r denied_valu"
124- + "es\030 \002 \003 (\t B\006 \n \004 kind\" |\n \026 ListConstraintsReque"
125- + "st\022 ;\n \006 parent\030 \001 \001 (\t B+\340 A\002 \372 A%\022 #orgpolicy.go"
126- + "ogleapis.com/Constraint\022 \021 \n \t page_size\030 \002 \001 "
127- + "(\005 \022 \022 \n \n page_token\030 \003 \001 (\t \" n\n \027 ListConstraint"
128- + "sResponse\022 :\n \013 constraints\030 \001 \003 (\013 2%.google."
129- + "cloud.orgpolicy.v2.Constraint\022 \027 \n \017 next_pa"
130- + "ge_token\030 \002 \001 (\t \" u\n \023 ListPoliciesRequest\022 7\n "
131- + "\006 parent\030 \001 \001 (\t B\' \340 A\002 \372 A!\022 \037 orgpolicy.googlea"
132- + "pis.com/Policy\022 \021 \n \t page_size\030 \002 \001 (\005 \022 \022 \n \n pag"
133- + "e_token\030 \003 \001 (\t \" d\n \024 ListPoliciesResponse\022 3\n "
134- + "\010 policies\030 \001 \003 (\013 2!.google.cloud.orgpolicy"
135- + ".v2.Policy\022 \027 \n \017 next_page_token\030 \002 \001 (\t \" I\n \020 G"
136- + "etPolicyRequest\022 5\n \004 name\030 \001 \001 (\t B\' \340 A\002 \372 A!\n \037 o"
137- + "rgpolicy.googleapis.com/Policy\" R\n \031 GetEff"
138- + "ectivePolicyRequest\022 5\n \004 name\030 \001 \001 (\t B\' \340 A\002 \372 A"
139- + "!\n \037 orgpolicy.googleapis.com/Policy\" \206 \001 \n \023 C"
140- + "reatePolicyRequest\022 7\n \006 parent\030 \001 \001 (\t B\' \340 A\002 \372 "
141- + "A!\022 \037 orgpolicy.googleapis.com/Policy\022 6\n \006 p"
142- + "olicy\030 \003 \001 (\013 2!.google.cloud.orgpolicy.v2."
143- + "PolicyB\003 \340 A\002 \" M\n \023 UpdatePolicyRequest\022 6\n \006 po"
144- + "licy\030 \001 \001 (\013 2!.google.cloud.orgpolicy.v2.P"
145- + "olicyB\003 \340 A\002 \" L\n \023 DeletePolicyRequest\022 5\n \004 nam"
146- + "e\030 \001 \001 (\t B\' \340 A\002 \372 A!\n \037 orgpolicy.googleapis.co"
147- + "m/Policy2\275 \016 \n \t OrgPolicy\022 \201 \002 \n \017 ListConstrain"
148- + "ts\022 1.google.cloud.orgpolicy.v2.ListConst"
149- + "raintsRequest\032 2.google.cloud.orgpolicy.v"
150- + "2.ListConstraintsResponse\" \206 \001 \202 \323 \344 \223 \002 w\022 #/v2/"
151- + "{parent=projects/*}/constraintsZ$\022 \" /v2/{"
152- + "parent=folders/*}/constraintsZ*\022 (/v2/{pa"
153- + "rent=organizations/*}/constraints\332 A\006 pare"
154- + "nt\022 \356 \001 \n \014 ListPolicies\022 ..google.cloud.orgpo"
155- + "licy.v2.ListPoliciesRequest\032 /.google.clo"
156- + "ud.orgpolicy.v2.ListPoliciesResponse\" }\202 \323 "
157- + "\344 \223 \002 n\022 /v2/{parent=projects/*}/policiesZ!"
158- + "\022 \037 /v2/{parent=folders/*}/policiesZ\' \022 %/v2"
159- + "/{parent=organizations/*}/policies\332 A\006 par"
160- + "ent\022 \330 \001 \n \t GetPolicy\022 +.google.cloud.orgpoli"
161- + "cy.v2.GetPolicyRequest\032 !.google.cloud.or"
162- + "gpolicy.v2.Policy\" {\202 \323 \344 \223 \002 n\022 /v2/{name=pro"
163- + "jects/*/policies/*}Z!\022 \037 /v2/{name=folders"
164- + "/*/policies/*}Z\' \022 %/v2/{name=organization"
165- + "s/*/policies/*}\332 A\004 name\022 \245 \002 \n \022 GetEffectiveP"
166- + "olicy\022 4.google.cloud.orgpolicy.v2.GetEff"
167- + "ectivePolicyRequest\032 !.google.cloud.orgpo"
168- + "licy.v2.Policy\" \265 \001 \202 \323 \344 \223 \002 \247 \001 \022 3/v2/{name=proj"
169- + "ects/*/policies/*}:getEffectivePolicyZ4\022 "
170- + "2/v2/{name=folders/*/policies/*}:getEffe"
171- + "ctivePolicyZ:\022 8/v2/{name=organizations/*"
172- + "/policies/*}:getEffectivePolicy\332 A\004 name\022 \201 "
173- + "\002 \n \014 CreatePolicy\022 ..google.cloud.orgpolicy"
174- + ".v2.CreatePolicyRequest\032 !.google.cloud.o"
175- + "rgpolicy.v2.Policy\" \235 \001 \202 \323 \344 \223 \002 \206 \001 \" /v2/{paren"
176- + "t=projects/*}/policies:\006 policyZ)\" \037 /v2/{p"
177- + "arent=folders/*}/policies:\006 policyZ/\" %/v2"
178- + "/{parent=organizations/*}/policies:\006 poli"
179- + "cy\332 A\r parent,policy\022 \217 \002 \n \014 UpdatePolicy\022 ..go"
180- + "ogle.cloud.orgpolicy.v2.UpdatePolicyRequ"
181- + "est\032 !.google.cloud.orgpolicy.v2.Policy\" \253 "
182- + "\001 \202 \323 \344 \223 \002 \233 \001 2\' /v2/{policy.name=projects/*/po"
183- + "licies/*}:\006 policyZ02&/v2/{policy.name=fo"
184- + "lders/*/policies/*}:\006 policyZ62,/v2/{poli"
185- + "cy.name=organizations/*/policies/*}:\006 pol"
186- + "icy\332 A\006 policy\022 \323 \001 \n \014 DeletePolicy\022 ..google.c"
187- + "loud.orgpolicy.v2.DeletePolicyRequest\032 \026 ."
188- + "google.protobuf.Empty\" {\202 \323 \344 \223 \002 n* /v2/{name"
189- + "=projects/*/policies/*}Z!*\037 /v2/{name=fol"
190- + "ders/*/policies/*}Z\' *%/v2/{name=organiza"
191- + "tions/*/policies/*}\332 A\004 name\032 L\312 A\030 orgpolicy"
192- + ".googleapis.com\322 A.https://www.googleapis"
193- + ".com/auth/cloud-platformB\314 \001 \n \035 com.google."
194- + "cloud.orgpolicy.v2B\016 OrgPolicyProtoP\001 ZBgo"
195- + "ogle.golang.org/genproto/googleapis/clou"
196- + "d/orgpolicy/v2;orgpolicy\252 \002 \031 Google.Cloud."
197- + "OrgPolicy.V2\312 \002 \031 Google\\ Cloud\\ OrgPolicy\\ V2"
198- + "\352 \002 \034 Google::Cloud::OrgPolicy::V2b\006 proto3"
106+ + "cy.v2.AlternatePolicySpecB\002 \030 \001 :\237 \001 \352 A\233 \001 \n \037 or"
107+ + "gpolicy.googleapis.com/Policy\022 $projects/"
108+ + "{project}/policies/{policy}\022 \" folders/{fo"
109+ + "lder}/policies/{policy}\022 .organizations/{"
110+ + "organization}/policies/{policy}\" Z\n \023 Alter"
111+ + "natePolicySpec\022 \016 \n \006 launch\030 \001 \001 (\t \022 3\n \004 spec\030 \002 "
112+ + " \001 (\013 2%.google.cloud.orgpolicy.v2.PolicyS"
113+ + "pec\" \306 \003 \n \n PolicySpec\022 \014 \n \004 etag\030 \001 \001 (\t \022 4\n \013 upda"
114+ + "te_time\030 \002 \001 (\013 2\032 .google.protobuf.Timestam"
115+ + "pB\003 \340 A\003 \022 ?\n \005 rules\030 \003 \003 (\013 20.google.cloud.org"
116+ + "policy.v2.PolicySpec.PolicyRule\022 \033 \n \023 inher"
117+ + "it_from_parent\030 \004 \001 (\010 \022 \r \n \005 reset\030 \005 \001 (\010 \032 \206 \002 \n \n "
118+ + "PolicyRule\022 O\n \006 values\030 \001 \001 (\013 2=.google.clou"
119+ + "d.orgpolicy.v2.PolicySpec.PolicyRule.Str"
120+ + "ingValuesH\000 \022 \023 \n \t allow_all\030 \002 \001 (\010 H\000 \022 \022 \n \010 deny"
121+ + "_all\030 \003 \001 (\010 H\000 \022 \021 \n \007 enforce\030 \004 \001 (\010 H\000 \022 $\n \t condi"
122+ + "tion\030 \005 \001 (\013 2\021 .google.type.Expr\032 =\n \014 StringV"
123+ + "alues\022 \026 \n \016 allowed_values\030 \001 \003 (\t \022 \025 \n \r denied_"
124+ + "values\030 \002 \003 (\t B\006 \n \004 kind\" |\n \026 ListConstraintsR"
125+ + "equest\022 ;\n \006 parent\030 \001 \001 (\t B+\340 A\002 \372 A%\022 #orgpolic"
126+ + "y.googleapis.com/Constraint\022 \021 \n \t page_size"
127+ + "\030 \002 \001 (\005 \022 \022 \n \n page_token\030 \003 \001 (\t \" n\n \027 ListConstr"
128+ + "aintsResponse\022 :\n \013 constraints\030 \001 \003 (\013 2%.goo"
129+ + "gle.cloud.orgpolicy.v2.Constraint\022 \027 \n \017 nex"
130+ + "t_page_token\030 \002 \001 (\t \" u\n \023 ListPoliciesReques"
131+ + "t\022 7\n \006 parent\030 \001 \001 (\t B\' \340 A\002 \372 A!\022 \037 orgpolicy.goo"
132+ + "gleapis.com/Policy\022 \021 \n \t page_size\030 \002 \001 (\005 \022 \022 \n "
133+ + "\n page_token\030 \003 \001 (\t \" d\n \024 ListPoliciesRespons"
134+ + "e\022 3\n \010 policies\030 \001 \003 (\013 2!.google.cloud.orgpo"
135+ + "licy.v2.Policy\022 \027 \n \017 next_page_token\030 \002 \001 (\t \" "
136+ + "I\n \020 GetPolicyRequest\022 5\n \004 name\030 \001 \001 (\t B\' \340 A\002 \372 A"
137+ + "!\n \037 orgpolicy.googleapis.com/Policy\" R\n \031 Ge"
138+ + "tEffectivePolicyRequest\022 5\n \004 name\030 \001 \001 (\t B\' \340 "
139+ + "A\002 \372 A!\n \037 orgpolicy.googleapis.com/Policy\" \206 "
140+ + "\001 \n \023 CreatePolicyRequest\022 7\n \006 parent\030 \001 \001 (\t B\' "
141+ + "\340 A\002 \372 A!\022 \037 orgpolicy.googleapis.com/Policy\022 "
142+ + "6\n \006 policy\030 \003 \001 (\013 2!.google.cloud.orgpolicy"
143+ + ".v2.PolicyB\003 \340 A\002 \" M\n \023 UpdatePolicyRequest\022 6"
144+ + "\n \006 policy\030 \001 \001 (\013 2!.google.cloud.orgpolicy."
145+ + "v2.PolicyB\003 \340 A\002 \" L\n \023 DeletePolicyRequest\022 5\n "
146+ + "\004 name\030 \001 \001 (\t B\' \340 A\002 \372 A!\n \037 orgpolicy.googleapi"
147+ + "s.com/Policy2\275 \016 \n \t OrgPolicy\022 \201 \002 \n \017 ListConst"
148+ + "raints\022 1.google.cloud.orgpolicy.v2.ListC"
149+ + "onstraintsRequest\032 2.google.cloud.orgpoli"
150+ + "cy.v2.ListConstraintsResponse\" \206 \001 \202 \323 \344 \223 \002 w\022 #"
151+ + "/v2/{parent=projects/*}/constraintsZ$\022 \" /"
152+ + "v2/{parent=folders/*}/constraintsZ*\022 (/v2"
153+ + "/{parent=organizations/*}/constraints\332 A\006 "
154+ + "parent\022 \356 \001 \n \014 ListPolicies\022 ..google.cloud.o"
155+ + "rgpolicy.v2.ListPoliciesRequest\032 /.google"
156+ + ".cloud.orgpolicy.v2.ListPoliciesResponse"
157+ + "\" }\202 \323 \344 \223 \002 n\022 /v2/{parent=projects/*}/polici"
158+ + "esZ!\022 \037 /v2/{parent=folders/*}/policiesZ\' \022 "
159+ + "%/v2/{parent=organizations/*}/policies\332 A"
160+ + "\006 parent\022 \330 \001 \n \t GetPolicy\022 +.google.cloud.org"
161+ + "policy.v2.GetPolicyRequest\032 !.google.clou"
162+ + "d.orgpolicy.v2.Policy\" {\202 \323 \344 \223 \002 n\022 /v2/{name"
163+ + "=projects/*/policies/*}Z!\022 \037 /v2/{name=fol"
164+ + "ders/*/policies/*}Z\' \022 %/v2/{name=organiza"
165+ + "tions/*/policies/*}\332 A\004 name\022 \245 \002 \n \022 GetEffect"
166+ + "ivePolicy\022 4.google.cloud.orgpolicy.v2.Ge"
167+ + "tEffectivePolicyRequest\032 !.google.cloud.o"
168+ + "rgpolicy.v2.Policy\" \265 \001 \202 \323 \344 \223 \002 \247 \001 \022 3/v2/{name="
169+ + "projects/*/policies/*}:getEffectivePolic"
170+ + "yZ4\022 2/v2/{name=folders/*/policies/*}:get"
171+ + "EffectivePolicyZ:\022 8/v2/{name=organizatio"
172+ + "ns/*/policies/*}:getEffectivePolicy\332 A\004 na"
173+ + "me\022 \201 \002 \n \014 CreatePolicy\022 ..google.cloud.orgpo"
174+ + "licy.v2.CreatePolicyRequest\032 !.google.clo"
175+ + "ud.orgpolicy.v2.Policy\" \235 \001 \202 \323 \344 \223 \002 \206 \001 \" /v2/{p"
176+ + "arent=projects/*}/policies:\006 policyZ)\" \037 /v"
177+ + "2/{parent=folders/*}/policies:\006 policyZ/\" "
178+ + "%/v2/{parent=organizations/*}/policies:\006 "
179+ + "policy\332 A\r parent,policy\022 \217 \002 \n \014 UpdatePolicy\022 "
180+ + "..google.cloud.orgpolicy.v2.UpdatePolicy"
181+ + "Request\032 !.google.cloud.orgpolicy.v2.Poli"
182+ + "cy\" \253 \001 \202 \323 \344 \223 \002 \233 \001 2\' /v2/{policy.name=projects/"
183+ + "*/policies/*}:\006 policyZ02&/v2/{policy.nam"
184+ + "e=folders/*/policies/*}:\006 policyZ62,/v2/{"
185+ + "policy.name=organizations/*/policies/*}:"
186+ + "\006 policy\332 A\006 policy\022 \323 \001 \n \014 DeletePolicy\022 ..goog"
187+ + "le.cloud.orgpolicy.v2.DeletePolicyReques"
188+ + "t\032 \026 .google.protobuf.Empty\" {\202 \323 \344 \223 \002 n* /v2/{"
189+ + "name=projects/*/policies/*}Z!*\037 /v2/{name"
190+ + "=folders/*/policies/*}Z\' *%/v2/{name=orga"
191+ + "nizations/*/policies/*}\332 A\004 name\032 L\312 A\030 orgpo"
192+ + "licy.googleapis.com\322 A.https://www.google"
193+ + "apis.com/auth/cloud-platformB\314 \001 \n \035 com.goo"
194+ + "gle.cloud.orgpolicy.v2B\016 OrgPolicyProtoP\001 "
195+ + "ZBgoogle.golang.org/genproto/googleapis/"
196+ + "cloud/orgpolicy/v2;orgpolicy\252 \002 \031 Google.Cl"
197+ + "oud.OrgPolicy.V2\312 \002 \031 Google\\ Cloud\\ OrgPolic"
198+ + "y\\ V2\352 \002 \034 Google::Cloud::OrgPolicy::V2b\006 pro"
199+ + "to3"
199200 };
200201 descriptor =
201202 com .google .protobuf .Descriptors .FileDescriptor .internalBuildGeneratedFileFrom (
0 commit comments