From 56360f8134dee9e17ce0621b8fecfedff33d04ab Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Tue, 9 Nov 2021 17:58:44 -0500 Subject: [PATCH 01/16] chore: use gapic-generator-python 0.56.2 (#91) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: update Java and Python dependencies PiperOrigin-RevId: 408420890 Source-Link: https://github.com/googleapis/googleapis/commit/2921f9fb3bfbd16f6b2da0104373e2b47a80a65e Source-Link: https://github.com/googleapis/googleapis-gen/commit/6598ca8cbbf5226733a099c4506518a5af6ff74c Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNjU5OGNhOGNiYmY1MjI2NzMzYTA5OWM0NTA2NTE4YTVhZjZmZjc0YyJ9 * 🦉 Updates from OwlBot See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md Co-authored-by: Owl Bot --- .../async_client.py | 13 +- .../managed_identities_service/client.py | 25 ++- .../transports/base.py | 10 +- .../transports/grpc.py | 6 +- .../transports/grpc_asyncio.py | 6 +- .../test_managed_identities_service.py | 156 ++++++++++++------ 6 files changed, 144 insertions(+), 72 deletions(-) diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py index dfbad0d..06e027c 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py @@ -19,14 +19,17 @@ from typing import Dict, Sequence, Tuple, Type, Union import pkg_resources -from google.api_core.client_options import ClientOptions # type: ignore -from google.api_core import exceptions as core_exceptions # type: ignore -from google.api_core import gapic_v1 # type: ignore -from google.api_core import retry as retries # type: ignore +from google.api_core.client_options import ClientOptions +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries from google.auth import credentials as ga_credentials # type: ignore from google.oauth2 import service_account # type: ignore -OptionalRetry = Union[retries.Retry, object] +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object] # type: ignore from google.api_core import operation # type: ignore from google.api_core import operation_async # type: ignore diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py index 0567cb0..8477df4 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py @@ -14,23 +14,25 @@ # limitations under the License. # from collections import OrderedDict -from distutils import util import os import re from typing import Dict, Optional, Sequence, Tuple, Type, Union import pkg_resources -from google.api_core import client_options as client_options_lib # type: ignore -from google.api_core import exceptions as core_exceptions # type: ignore -from google.api_core import gapic_v1 # type: ignore -from google.api_core import retry as retries # type: ignore +from google.api_core import client_options as client_options_lib +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries from google.auth import credentials as ga_credentials # type: ignore from google.auth.transport import mtls # type: ignore from google.auth.transport.grpc import SslCredentials # type: ignore from google.auth.exceptions import MutualTLSChannelError # type: ignore from google.oauth2 import service_account # type: ignore -OptionalRetry = Union[retries.Retry, object] +try: + OptionalRetry = Union[retries.Retry, gapic_v1.method._MethodDefault] +except AttributeError: # pragma: NO COVER + OptionalRetry = Union[retries.Retry, object] # type: ignore from google.api_core import operation # type: ignore from google.api_core import operation_async # type: ignore @@ -326,8 +328,15 @@ def __init__( client_options = client_options_lib.ClientOptions() # Create SSL credentials for mutual TLS if needed. - use_client_cert = bool( - util.strtobool(os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false")) + if os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") not in ( + "true", + "false", + ): + raise ValueError( + "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) + use_client_cert = ( + os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true" ) client_cert_source_func = None diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py index d60bbd2..3cfa543 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py @@ -18,11 +18,11 @@ import pkg_resources import google.auth # type: ignore -import google.api_core # type: ignore -from google.api_core import exceptions as core_exceptions # type: ignore -from google.api_core import gapic_v1 # type: ignore -from google.api_core import retry as retries # type: ignore -from google.api_core import operations_v1 # type: ignore +import google.api_core +from google.api_core import exceptions as core_exceptions +from google.api_core import gapic_v1 +from google.api_core import retry as retries +from google.api_core import operations_v1 from google.auth import credentials as ga_credentials # type: ignore from google.oauth2 import service_account # type: ignore diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py index c81915d..2b49366 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py @@ -16,9 +16,9 @@ import warnings from typing import Callable, Dict, Optional, Sequence, Tuple, Union -from google.api_core import grpc_helpers # type: ignore -from google.api_core import operations_v1 # type: ignore -from google.api_core import gapic_v1 # type: ignore +from google.api_core import grpc_helpers +from google.api_core import operations_v1 +from google.api_core import gapic_v1 import google.auth # type: ignore from google.auth import credentials as ga_credentials # type: ignore from google.auth.transport.grpc import SslCredentials # type: ignore diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py index 6c987e9..a8586ee 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py @@ -16,9 +16,9 @@ import warnings from typing import Awaitable, Callable, Dict, Optional, Sequence, Tuple, Union -from google.api_core import gapic_v1 # type: ignore -from google.api_core import grpc_helpers_async # type: ignore -from google.api_core import operations_v1 # type: ignore +from google.api_core import gapic_v1 +from google.api_core import grpc_helpers_async +from google.api_core import operations_v1 from google.auth import credentials as ga_credentials # type: ignore from google.auth.transport.grpc import SslCredentials # type: ignore diff --git a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py index 35909da..bb21123 100644 --- a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py +++ b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py @@ -688,9 +688,15 @@ def test_create_microsoft_ad_domain_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].parent == "parent_value" - assert args[0].domain_name == "domain_name_value" - assert args[0].domain == resource.Domain(name="name_value") + arg = args[0].parent + mock_val = "parent_value" + assert arg == mock_val + arg = args[0].domain_name + mock_val = "domain_name_value" + assert arg == mock_val + arg = args[0].domain + mock_val = resource.Domain(name="name_value") + assert arg == mock_val def test_create_microsoft_ad_domain_flattened_error(): @@ -737,9 +743,15 @@ async def test_create_microsoft_ad_domain_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].parent == "parent_value" - assert args[0].domain_name == "domain_name_value" - assert args[0].domain == resource.Domain(name="name_value") + arg = args[0].parent + mock_val = "parent_value" + assert arg == mock_val + arg = args[0].domain_name + mock_val = "domain_name_value" + assert arg == mock_val + arg = args[0].domain + mock_val = resource.Domain(name="name_value") + assert arg == mock_val @pytest.mark.asyncio @@ -930,7 +942,9 @@ def test_reset_admin_password_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val def test_reset_admin_password_flattened_error(): @@ -970,7 +984,9 @@ async def test_reset_admin_password_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val @pytest.mark.asyncio @@ -1148,7 +1164,9 @@ def test_list_domains_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].parent == "parent_value" + arg = args[0].parent + mock_val = "parent_value" + assert arg == mock_val def test_list_domains_flattened_error(): @@ -1186,7 +1204,9 @@ async def test_list_domains_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].parent == "parent_value" + arg = args[0].parent + mock_val = "parent_value" + assert arg == mock_val @pytest.mark.asyncio @@ -1525,7 +1545,9 @@ def test_get_domain_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val def test_get_domain_flattened_error(): @@ -1561,7 +1583,9 @@ async def test_get_domain_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val @pytest.mark.asyncio @@ -1733,8 +1757,12 @@ def test_update_domain_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].domain == resource.Domain(name="name_value") - assert args[0].update_mask == field_mask_pb2.FieldMask(paths=["paths_value"]) + arg = args[0].domain + mock_val = resource.Domain(name="name_value") + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=["paths_value"]) + assert arg == mock_val def test_update_domain_flattened_error(): @@ -1777,8 +1805,12 @@ async def test_update_domain_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].domain == resource.Domain(name="name_value") - assert args[0].update_mask == field_mask_pb2.FieldMask(paths=["paths_value"]) + arg = args[0].domain + mock_val = resource.Domain(name="name_value") + assert arg == mock_val + arg = args[0].update_mask + mock_val = field_mask_pb2.FieldMask(paths=["paths_value"]) + assert arg == mock_val @pytest.mark.asyncio @@ -1949,7 +1981,9 @@ def test_delete_domain_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val def test_delete_domain_flattened_error(): @@ -1987,7 +2021,9 @@ async def test_delete_domain_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val @pytest.mark.asyncio @@ -2159,10 +2195,12 @@ def test_attach_trust_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" - assert args[0].trust == resource.Trust( - target_domain_name="target_domain_name_value" - ) + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val + arg = args[0].trust + mock_val = resource.Trust(target_domain_name="target_domain_name_value") + assert arg == mock_val def test_attach_trust_flattened_error(): @@ -2205,10 +2243,12 @@ async def test_attach_trust_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" - assert args[0].trust == resource.Trust( - target_domain_name="target_domain_name_value" - ) + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val + arg = args[0].trust + mock_val = resource.Trust(target_domain_name="target_domain_name_value") + assert arg == mock_val @pytest.mark.asyncio @@ -2396,9 +2436,15 @@ def test_reconfigure_trust_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" - assert args[0].target_domain_name == "target_domain_name_value" - assert args[0].target_dns_ip_addresses == ["target_dns_ip_addresses_value"] + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val + arg = args[0].target_domain_name + mock_val = "target_domain_name_value" + assert arg == mock_val + arg = args[0].target_dns_ip_addresses + mock_val = ["target_dns_ip_addresses_value"] + assert arg == mock_val def test_reconfigure_trust_flattened_error(): @@ -2445,9 +2491,15 @@ async def test_reconfigure_trust_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" - assert args[0].target_domain_name == "target_domain_name_value" - assert args[0].target_dns_ip_addresses == ["target_dns_ip_addresses_value"] + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val + arg = args[0].target_domain_name + mock_val = "target_domain_name_value" + assert arg == mock_val + arg = args[0].target_dns_ip_addresses + mock_val = ["target_dns_ip_addresses_value"] + assert arg == mock_val @pytest.mark.asyncio @@ -2622,10 +2674,12 @@ def test_detach_trust_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" - assert args[0].trust == resource.Trust( - target_domain_name="target_domain_name_value" - ) + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val + arg = args[0].trust + mock_val = resource.Trust(target_domain_name="target_domain_name_value") + assert arg == mock_val def test_detach_trust_flattened_error(): @@ -2668,10 +2722,12 @@ async def test_detach_trust_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" - assert args[0].trust == resource.Trust( - target_domain_name="target_domain_name_value" - ) + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val + arg = args[0].trust + mock_val = resource.Trust(target_domain_name="target_domain_name_value") + assert arg == mock_val @pytest.mark.asyncio @@ -2846,10 +2902,12 @@ def test_validate_trust_flattened(): # request object values. assert len(call.mock_calls) == 1 _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" - assert args[0].trust == resource.Trust( - target_domain_name="target_domain_name_value" - ) + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val + arg = args[0].trust + mock_val = resource.Trust(target_domain_name="target_domain_name_value") + assert arg == mock_val def test_validate_trust_flattened_error(): @@ -2892,10 +2950,12 @@ async def test_validate_trust_flattened_async(): # request object values. assert len(call.mock_calls) _, args, _ = call.mock_calls[0] - assert args[0].name == "name_value" - assert args[0].trust == resource.Trust( - target_domain_name="target_domain_name_value" - ) + arg = args[0].name + mock_val = "name_value" + assert arg == mock_val + arg = args[0].trust + mock_val = resource.Trust(target_domain_name="target_domain_name_value") + assert arg == mock_val @pytest.mark.asyncio From 2ede11f1ca9e40cdd079d34a5093624d056222f3 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Thu, 11 Nov 2021 18:46:53 -0500 Subject: [PATCH 02/16] chore(python): add .github/CODEOWNERS as a templated file (#92) Source-Link: https://github.com/googleapis/synthtool/commit/c5026b3217973a8db55db8ee85feee0e9a65e295 Post-Processor: gcr.io/cloud-devrel-public-resources/owlbot-python:latest@sha256:0e18b9475fbeb12d9ad4302283171edebb6baf2dfca1bd215ee3b34ed79d95d7 Co-authored-by: Owl Bot --- .github/.OwlBot.lock.yaml | 2 +- .github/CODEOWNERS | 7 ++++--- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/.github/.OwlBot.lock.yaml b/.github/.OwlBot.lock.yaml index cb89b2e..7519fa3 100644 --- a/.github/.OwlBot.lock.yaml +++ b/.github/.OwlBot.lock.yaml @@ -1,3 +1,3 @@ docker: image: gcr.io/cloud-devrel-public-resources/owlbot-python:latest - digest: sha256:ec49167c606648a063d1222220b48119c912562849a0528f35bfb592a9f72737 + digest: sha256:0e18b9475fbeb12d9ad4302283171edebb6baf2dfca1bd215ee3b34ed79d95d7 diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS index be888a9..44cc868 100644 --- a/.github/CODEOWNERS +++ b/.github/CODEOWNERS @@ -3,9 +3,10 @@ # # For syntax help see: # https://help.github.com/en/github/creating-cloning-and-archiving-repositories/about-code-owners#codeowners-syntax +# Note: This file is autogenerated. To make changes to the codeowner team, please update .repo-metadata.json. -# The @googleapis/yoshi-python is the default owner for changes in this repo -* @googleapis/yoshi-python - +# @googleapis/yoshi-python is the default owner for changes in this repo +* @googleapis/yoshi-python +# @googleapis/python-samples-owners is the default owner for samples changes /samples/ @googleapis/python-samples-owners From eadfcef03fc19a0c5fe1a6ba8fe963f0f32f3ece Mon Sep 17 00:00:00 2001 From: Dan Lee <71398022+dandhlee@users.noreply.github.com> Date: Wed, 17 Nov 2021 17:15:51 -0500 Subject: [PATCH 03/16] chore: update doc links from googleapis.dev to cloud.google.com (#93) --- .repo-metadata.json | 2 +- README.rst | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/.repo-metadata.json b/.repo-metadata.json index a89dc73..d39833b 100644 --- a/.repo-metadata.json +++ b/.repo-metadata.json @@ -2,7 +2,7 @@ "name": "managedidentities", "name_pretty": "Managed Service for Microsoft Active Directory", "product_documentation": "https://cloud.google.com/managed-microsoft-ad/", - "client_documentation": "https://googleapis.dev/python/managedidentities/latest", + "client_documentation": "https://cloud.google.com/python/docs/reference/managedidentities/latest", "issue_tracker": "", "release_level": "ga", "language": "python", diff --git a/README.rst b/README.rst index 955c0f7..1fbd039 100644 --- a/README.rst +++ b/README.rst @@ -19,7 +19,7 @@ on-premises AD domain to the cloud. .. |versions| image:: https://img.shields.io/pypi/pyversions/google-cloud-managed-identities.svg :target: https://pypi.org/project/google-cloud-managed-identities/ .. _Managed Service for Microsoft Active Directory: https://cloud.google.com/managed-microsoft-ad/ -.. _Client Library Documentation: https://googleapis.dev/python/managedidentities/latest +.. _Client Library Documentation: https://cloud.google.com/python/docs/reference/managedidentities/latest .. _Product Documentation: https://cloud.google.com/managed-microsoft-ad/ Quick Start From b0bd16ae8d1472ccf5e8d3d943aef40ab2031741 Mon Sep 17 00:00:00 2001 From: Anthonios Partheniou Date: Tue, 28 Dec 2021 13:20:32 -0500 Subject: [PATCH 04/16] chore: update .repo-metadata.json (#97) --- .repo-metadata.json | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/.repo-metadata.json b/.repo-metadata.json index d39833b..513d75d 100644 --- a/.repo-metadata.json +++ b/.repo-metadata.json @@ -4,12 +4,13 @@ "product_documentation": "https://cloud.google.com/managed-microsoft-ad/", "client_documentation": "https://cloud.google.com/python/docs/reference/managedidentities/latest", "issue_tracker": "", - "release_level": "ga", + "release_level": "stable", "language": "python", "library_type": "GAPIC_AUTO", "repo": "googleapis/python-managed-identities", "distribution_name": "google-cloud-managed-identities", "api_id": "managedidentities.googleapis.com", "default_version": "v1", - "codeowner_team": "" + "codeowner_team": "", + "api_shortname": "managedidentities" } From 10143569bf9a238d78ad8b0571b622e597afb08a Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Thu, 6 Jan 2022 17:16:32 +0000 Subject: [PATCH 05/16] chore: use python-samples-reviewers (#99) --- .github/.OwlBot.lock.yaml | 2 +- .github/CODEOWNERS | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/.OwlBot.lock.yaml b/.github/.OwlBot.lock.yaml index 7519fa3..f33299d 100644 --- a/.github/.OwlBot.lock.yaml +++ b/.github/.OwlBot.lock.yaml @@ -1,3 +1,3 @@ docker: image: gcr.io/cloud-devrel-public-resources/owlbot-python:latest - digest: sha256:0e18b9475fbeb12d9ad4302283171edebb6baf2dfca1bd215ee3b34ed79d95d7 + digest: sha256:899d5d7cc340fa8ef9d8ae1a8cfba362c6898584f779e156f25ee828ba824610 diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS index 44cc868..e446644 100644 --- a/.github/CODEOWNERS +++ b/.github/CODEOWNERS @@ -8,5 +8,5 @@ # @googleapis/yoshi-python is the default owner for changes in this repo * @googleapis/yoshi-python -# @googleapis/python-samples-owners is the default owner for samples changes -/samples/ @googleapis/python-samples-owners +# @googleapis/python-samples-reviewers is the default owner for samples changes +/samples/ @googleapis/python-samples-reviewers From 550633ccc61f2dd6c0bd27565d2a27d71971ca56 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Fri, 7 Jan 2022 19:41:18 -0500 Subject: [PATCH 06/16] chore: use gapic-generator-python 0.58.4 (#98) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: use gapic-generator-python 0.58.4 fix: provide appropriate mock values for message body fields committer: dovs PiperOrigin-RevId: 419025932 Source-Link: https://github.com/googleapis/googleapis/commit/73da6697f598f1ba30618924936a59f8e457ec89 Source-Link: https://github.com/googleapis/googleapis-gen/commit/46df624a54b9ed47c1a7eefb7a49413cf7b82f98 Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNDZkZjYyNGE1NGI5ZWQ0N2MxYTdlZWZiN2E0OTQxM2NmN2I4MmY5OCJ9 * 🦉 Updates from OwlBot See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md Co-authored-by: Owl Bot Co-authored-by: Anthonios Partheniou --- .../transports/base.py | 1 - .../test_managed_identities_service.py | 136 +++++++----------- 2 files changed, 51 insertions(+), 86 deletions(-) diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py index 3cfa543..93d42cd 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py @@ -104,7 +104,6 @@ def __init__( credentials, _ = google.auth.load_credentials_from_file( credentials_file, **scopes_kwargs, quota_project_id=quota_project_id ) - elif credentials is None: credentials, _ = google.auth.default( **scopes_kwargs, quota_project_id=quota_project_id diff --git a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py index bb21123..2538b30 100644 --- a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py +++ b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py @@ -270,20 +270,20 @@ def test_managed_identities_service_client_client_options( # unsupported value. with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "Unsupported"}): with pytest.raises(MutualTLSChannelError): - client = client_class() + client = client_class(transport=transport_name) # Check the case GOOGLE_API_USE_CLIENT_CERTIFICATE has unsupported value. with mock.patch.dict( os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "Unsupported"} ): with pytest.raises(ValueError): - client = client_class() + client = client_class(transport=transport_name) # Check the case quota_project_id is provided options = client_options.ClientOptions(quota_project_id="octopus") with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None - client = client_class(transport=transport_name, client_options=options) + client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, @@ -352,7 +352,7 @@ def test_managed_identities_service_client_mtls_env_auto( ) with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None - client = client_class(transport=transport_name, client_options=options) + client = client_class(client_options=options, transport=transport_name) if use_client_cert_env == "false": expected_client_cert_source = None @@ -451,7 +451,7 @@ def test_managed_identities_service_client_client_options_scopes( options = client_options.ClientOptions(scopes=["1", "2"],) with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None - client = client_class(transport=transport_name, client_options=options) + client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file=None, @@ -486,7 +486,7 @@ def test_managed_identities_service_client_client_options_credentials_file( options = client_options.ClientOptions(credentials_file="credentials.json") with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None - client = client_class(transport=transport_name, client_options=options) + client = client_class(client_options=options, transport=transport_name) patched.assert_called_once_with( credentials=None, credentials_file="credentials.json", @@ -519,10 +519,10 @@ def test_managed_identities_service_client_client_options_from_dict(): ) -def test_create_microsoft_ad_domain( - transport: str = "grpc", - request_type=managed_identities_service.CreateMicrosoftAdDomainRequest, -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.CreateMicrosoftAdDomainRequest, dict,] +) +def test_create_microsoft_ad_domain(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -548,10 +548,6 @@ def test_create_microsoft_ad_domain( assert isinstance(response, future.Future) -def test_create_microsoft_ad_domain_from_dict(): - test_create_microsoft_ad_domain(request_type=dict) - - def test_create_microsoft_ad_domain_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -771,10 +767,10 @@ async def test_create_microsoft_ad_domain_flattened_error_async(): ) -def test_reset_admin_password( - transport: str = "grpc", - request_type=managed_identities_service.ResetAdminPasswordRequest, -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.ResetAdminPasswordRequest, dict,] +) +def test_reset_admin_password(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -803,10 +799,6 @@ def test_reset_admin_password( assert response.password == "password_value" -def test_reset_admin_password_from_dict(): - test_reset_admin_password(request_type=dict) - - def test_reset_admin_password_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -1003,9 +995,10 @@ async def test_reset_admin_password_flattened_error_async(): ) -def test_list_domains( - transport: str = "grpc", request_type=managed_identities_service.ListDomainsRequest -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.ListDomainsRequest, dict,] +) +def test_list_domains(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -1033,10 +1026,6 @@ def test_list_domains( assert response.unreachable == ["unreachable_value"] -def test_list_domains_from_dict(): - test_list_domains(request_type=dict) - - def test_list_domains_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -1223,9 +1212,9 @@ async def test_list_domains_flattened_error_async(): ) -def test_list_domains_pager(): +def test_list_domains_pager(transport_name: str = "grpc"): client = ManagedIdentitiesServiceClient( - credentials=ga_credentials.AnonymousCredentials, + credentials=ga_credentials.AnonymousCredentials, transport=transport_name, ) # Mock the actual call within the gRPC stub, and fake the request. @@ -1261,9 +1250,9 @@ def test_list_domains_pager(): assert all(isinstance(i, resource.Domain) for i in results) -def test_list_domains_pages(): +def test_list_domains_pages(transport_name: str = "grpc"): client = ManagedIdentitiesServiceClient( - credentials=ga_credentials.AnonymousCredentials, + credentials=ga_credentials.AnonymousCredentials, transport=transport_name, ) # Mock the actual call within the gRPC stub, and fake the request. @@ -1361,9 +1350,10 @@ async def test_list_domains_async_pages(): assert page_.raw_page.next_page_token == token -def test_get_domain( - transport: str = "grpc", request_type=managed_identities_service.GetDomainRequest -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.GetDomainRequest, dict,] +) +def test_get_domain(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -1404,10 +1394,6 @@ def test_get_domain( assert response.status_message == "status_message_value" -def test_get_domain_from_dict(): - test_get_domain(request_type=dict) - - def test_get_domain_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -1602,9 +1588,10 @@ async def test_get_domain_flattened_error_async(): ) -def test_update_domain( - transport: str = "grpc", request_type=managed_identities_service.UpdateDomainRequest -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.UpdateDomainRequest, dict,] +) +def test_update_domain(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -1628,10 +1615,6 @@ def test_update_domain( assert isinstance(response, future.Future) -def test_update_domain_from_dict(): - test_update_domain(request_type=dict) - - def test_update_domain_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -1829,9 +1812,10 @@ async def test_update_domain_flattened_error_async(): ) -def test_delete_domain( - transport: str = "grpc", request_type=managed_identities_service.DeleteDomainRequest -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.DeleteDomainRequest, dict,] +) +def test_delete_domain(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -1855,10 +1839,6 @@ def test_delete_domain( assert isinstance(response, future.Future) -def test_delete_domain_from_dict(): - test_delete_domain(request_type=dict) - - def test_delete_domain_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -2040,9 +2020,10 @@ async def test_delete_domain_flattened_error_async(): ) -def test_attach_trust( - transport: str = "grpc", request_type=managed_identities_service.AttachTrustRequest -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.AttachTrustRequest, dict,] +) +def test_attach_trust(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -2066,10 +2047,6 @@ def test_attach_trust( assert isinstance(response, future.Future) -def test_attach_trust_from_dict(): - test_attach_trust(request_type=dict) - - def test_attach_trust_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -2267,10 +2244,10 @@ async def test_attach_trust_flattened_error_async(): ) -def test_reconfigure_trust( - transport: str = "grpc", - request_type=managed_identities_service.ReconfigureTrustRequest, -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.ReconfigureTrustRequest, dict,] +) +def test_reconfigure_trust(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -2296,10 +2273,6 @@ def test_reconfigure_trust( assert isinstance(response, future.Future) -def test_reconfigure_trust_from_dict(): - test_reconfigure_trust(request_type=dict) - - def test_reconfigure_trust_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -2519,9 +2492,10 @@ async def test_reconfigure_trust_flattened_error_async(): ) -def test_detach_trust( - transport: str = "grpc", request_type=managed_identities_service.DetachTrustRequest -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.DetachTrustRequest, dict,] +) +def test_detach_trust(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -2545,10 +2519,6 @@ def test_detach_trust( assert isinstance(response, future.Future) -def test_detach_trust_from_dict(): - test_detach_trust(request_type=dict) - - def test_detach_trust_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -2746,10 +2716,10 @@ async def test_detach_trust_flattened_error_async(): ) -def test_validate_trust( - transport: str = "grpc", - request_type=managed_identities_service.ValidateTrustRequest, -): +@pytest.mark.parametrize( + "request_type", [managed_identities_service.ValidateTrustRequest, dict,] +) +def test_validate_trust(request_type, transport: str = "grpc"): client = ManagedIdentitiesServiceClient( credentials=ga_credentials.AnonymousCredentials(), transport=transport, ) @@ -2773,10 +2743,6 @@ def test_validate_trust( assert isinstance(response, future.Future) -def test_validate_trust_from_dict(): - test_validate_trust(request_type=dict) - - def test_validate_trust_empty_call(): # This test is a coverage failsafe to make sure that totally empty calls, # i.e. request == None and no flattened fields passed, work. @@ -3536,7 +3502,7 @@ def test_parse_common_location_path(): assert expected == actual -def test_client_withDEFAULT_CLIENT_INFO(): +def test_client_with_default_client_info(): client_info = gapic_v1.client_info.ClientInfo() with mock.patch.object( From bf8d5bf74f7a1bcaaf9ec919f3518b4d3f69c082 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Thu, 13 Jan 2022 15:46:12 +0000 Subject: [PATCH 07/16] build: switch to release-please for tagging (#100) --- .github/.OwlBot.lock.yaml | 2 +- .github/release-please.yml | 1 + .github/release-trigger.yml | 1 + 3 files changed, 3 insertions(+), 1 deletion(-) create mode 100644 .github/release-trigger.yml diff --git a/.github/.OwlBot.lock.yaml b/.github/.OwlBot.lock.yaml index f33299d..ff5126c 100644 --- a/.github/.OwlBot.lock.yaml +++ b/.github/.OwlBot.lock.yaml @@ -1,3 +1,3 @@ docker: image: gcr.io/cloud-devrel-public-resources/owlbot-python:latest - digest: sha256:899d5d7cc340fa8ef9d8ae1a8cfba362c6898584f779e156f25ee828ba824610 + digest: sha256:dfa9b663b32de8b5b327e32c1da665a80de48876558dd58091d8160c60ad7355 diff --git a/.github/release-please.yml b/.github/release-please.yml index 4507ad0..466597e 100644 --- a/.github/release-please.yml +++ b/.github/release-please.yml @@ -1 +1,2 @@ releaseType: python +handleGHRelease: true diff --git a/.github/release-trigger.yml b/.github/release-trigger.yml new file mode 100644 index 0000000..d4ca941 --- /dev/null +++ b/.github/release-trigger.yml @@ -0,0 +1 @@ +enabled: true From 29071427aafa0df7f08213a5a7eb53fb80b848cc Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Fri, 14 Jan 2022 16:23:05 -0500 Subject: [PATCH 08/16] chore(python): update release.sh to use keystore (#101) Source-Link: https://github.com/googleapis/synthtool/commit/69fda12e2994f0b595a397e8bb6e3e9f380524eb Post-Processor: gcr.io/cloud-devrel-public-resources/owlbot-python:latest@sha256:ae600f36b6bc972b368367b6f83a1d91ec2c82a4a116b383d67d547c56fe6de3 Co-authored-by: Owl Bot --- .github/.OwlBot.lock.yaml | 2 +- .kokoro/release.sh | 2 +- .kokoro/release/common.cfg | 12 +++++++++++- 3 files changed, 13 insertions(+), 3 deletions(-) diff --git a/.github/.OwlBot.lock.yaml b/.github/.OwlBot.lock.yaml index ff5126c..eecb84c 100644 --- a/.github/.OwlBot.lock.yaml +++ b/.github/.OwlBot.lock.yaml @@ -1,3 +1,3 @@ docker: image: gcr.io/cloud-devrel-public-resources/owlbot-python:latest - digest: sha256:dfa9b663b32de8b5b327e32c1da665a80de48876558dd58091d8160c60ad7355 + digest: sha256:ae600f36b6bc972b368367b6f83a1d91ec2c82a4a116b383d67d547c56fe6de3 diff --git a/.kokoro/release.sh b/.kokoro/release.sh index 1b33b10..bc00211 100755 --- a/.kokoro/release.sh +++ b/.kokoro/release.sh @@ -26,7 +26,7 @@ python3 -m pip install --upgrade twine wheel setuptools export PYTHONUNBUFFERED=1 # Move into the package, build the distribution and upload. -TWINE_PASSWORD=$(cat "${KOKORO_GFILE_DIR}/secret_manager/google-cloud-pypi-token") +TWINE_PASSWORD=$(cat "${KOKORO_KEYSTORE_DIR}/73713_google-cloud-pypi-token-keystore-1") cd github/python-managed-identities python3 setup.py sdist bdist_wheel twine upload --username __token__ --password "${TWINE_PASSWORD}" dist/* diff --git a/.kokoro/release/common.cfg b/.kokoro/release/common.cfg index 9868503..fcb98ff 100644 --- a/.kokoro/release/common.cfg +++ b/.kokoro/release/common.cfg @@ -23,8 +23,18 @@ env_vars: { value: "github/python-managed-identities/.kokoro/release.sh" } +# Fetch PyPI password +before_action { + fetch_keystore { + keystore_resource { + keystore_config_id: 73713 + keyname: "google-cloud-pypi-token-keystore-1" + } + } +} + # Tokens needed to report release status back to GitHub env_vars: { key: "SECRET_MANAGER_KEYS" - value: "releasetool-publish-reporter-app,releasetool-publish-reporter-googleapis-installation,releasetool-publish-reporter-pem,google-cloud-pypi-token" + value: "releasetool-publish-reporter-app,releasetool-publish-reporter-googleapis-installation,releasetool-publish-reporter-pem" } From 88d3f4cffc269ffe9776a94040ffdcc54fd76422 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Thu, 20 Jan 2022 19:22:23 -0500 Subject: [PATCH 09/16] ci(python): run lint / unit tests / docs as GH actions (#102) * ci(python): run lint / unit tests / docs as GH actions Source-Link: https://github.com/googleapis/synthtool/commit/57be0cdb0b94e1669cee0ca38d790de1dfdbcd44 Post-Processor: gcr.io/cloud-devrel-public-resources/owlbot-python:latest@sha256:ed1f9983d5a935a89fe8085e8bb97d94e41015252c5b6c9771257cf8624367e6 * add commit to trigger gh actions Co-authored-by: Owl Bot Co-authored-by: Anthonios Partheniou --- .github/.OwlBot.lock.yaml | 16 +++++++++- .github/workflows/docs.yml | 38 +++++++++++++++++++++++ .github/workflows/lint.yml | 25 +++++++++++++++ .github/workflows/unittest.yml | 57 ++++++++++++++++++++++++++++++++++ 4 files changed, 135 insertions(+), 1 deletion(-) create mode 100644 .github/workflows/docs.yml create mode 100644 .github/workflows/lint.yml create mode 100644 .github/workflows/unittest.yml diff --git a/.github/.OwlBot.lock.yaml b/.github/.OwlBot.lock.yaml index eecb84c..b668c04 100644 --- a/.github/.OwlBot.lock.yaml +++ b/.github/.OwlBot.lock.yaml @@ -1,3 +1,17 @@ +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. docker: image: gcr.io/cloud-devrel-public-resources/owlbot-python:latest - digest: sha256:ae600f36b6bc972b368367b6f83a1d91ec2c82a4a116b383d67d547c56fe6de3 + digest: sha256:ed1f9983d5a935a89fe8085e8bb97d94e41015252c5b6c9771257cf8624367e6 + diff --git a/.github/workflows/docs.yml b/.github/workflows/docs.yml new file mode 100644 index 0000000..f7b8344 --- /dev/null +++ b/.github/workflows/docs.yml @@ -0,0 +1,38 @@ +on: + pull_request: + branches: + - main +name: docs +jobs: + docs: + runs-on: ubuntu-latest + steps: + - name: Checkout + uses: actions/checkout@v2 + - name: Setup Python + uses: actions/setup-python@v2 + with: + python-version: "3.10" + - name: Install nox + run: | + python -m pip install --upgrade setuptools pip wheel + python -m pip install nox + - name: Run docs + run: | + nox -s docs + docfx: + runs-on: ubuntu-latest + steps: + - name: Checkout + uses: actions/checkout@v2 + - name: Setup Python + uses: actions/setup-python@v2 + with: + python-version: "3.10" + - name: Install nox + run: | + python -m pip install --upgrade setuptools pip wheel + python -m pip install nox + - name: Run docfx + run: | + nox -s docfx diff --git a/.github/workflows/lint.yml b/.github/workflows/lint.yml new file mode 100644 index 0000000..1e8b05c --- /dev/null +++ b/.github/workflows/lint.yml @@ -0,0 +1,25 @@ +on: + pull_request: + branches: + - main +name: lint +jobs: + lint: + runs-on: ubuntu-latest + steps: + - name: Checkout + uses: actions/checkout@v2 + - name: Setup Python + uses: actions/setup-python@v2 + with: + python-version: "3.10" + - name: Install nox + run: | + python -m pip install --upgrade setuptools pip wheel + python -m pip install nox + - name: Run lint + run: | + nox -s lint + - name: Run lint_setup_py + run: | + nox -s lint_setup_py diff --git a/.github/workflows/unittest.yml b/.github/workflows/unittest.yml new file mode 100644 index 0000000..074ee25 --- /dev/null +++ b/.github/workflows/unittest.yml @@ -0,0 +1,57 @@ +on: + pull_request: + branches: + - main +name: unittest +jobs: + unit: + runs-on: ubuntu-latest + strategy: + matrix: + python: ['3.6', '3.7', '3.8', '3.9', '3.10'] + steps: + - name: Checkout + uses: actions/checkout@v2 + - name: Setup Python + uses: actions/setup-python@v2 + with: + python-version: ${{ matrix.python }} + - name: Install nox + run: | + python -m pip install --upgrade setuptools pip wheel + python -m pip install nox + - name: Run unit tests + env: + COVERAGE_FILE: .coverage-${{ matrix.python }} + run: | + nox -s unit-${{ matrix.python }} + - name: Upload coverage results + uses: actions/upload-artifact@v2 + with: + name: coverage-artifacts + path: .coverage-${{ matrix.python }} + + cover: + runs-on: ubuntu-latest + needs: + - unit + steps: + - name: Checkout + uses: actions/checkout@v2 + - name: Setup Python + uses: actions/setup-python@v2 + with: + python-version: "3.10" + - name: Install coverage + run: | + python -m pip install --upgrade setuptools pip wheel + python -m pip install coverage + - name: Download coverage results + uses: actions/download-artifact@v2 + with: + name: coverage-artifacts + path: .coverage-results/ + - name: Report coverage results + run: | + coverage combine .coverage-results/.coverage* + coverage report --show-missing --fail-under=100 From 91b316a5da34c8ecec852d811c2e7a9bd5254379 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Tue, 25 Jan 2022 10:12:40 -0500 Subject: [PATCH 10/16] feat: add api key support (#103) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: upgrade gapic-generator-java, gax-java and gapic-generator-python PiperOrigin-RevId: 423842556 Source-Link: https://github.com/googleapis/googleapis/commit/a616ca08f4b1416abbac7bc5dd6d61c791756a81 Source-Link: https://github.com/googleapis/googleapis-gen/commit/29b938c58c1e51d019f2ee539d55dc0a3c86a905 Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiMjliOTM4YzU4YzFlNTFkMDE5ZjJlZTUzOWQ1NWRjMGEzYzg2YTkwNSJ9 * 🦉 Updates from OwlBot See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md Co-authored-by: Owl Bot --- .../async_client.py | 38 ++++- .../managed_identities_service/client.py | 127 ++++++++++------ .../test_managed_identities_service.py | 139 ++++++++++++++++++ 3 files changed, 260 insertions(+), 44 deletions(-) diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py index 06e027c..656c668 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py @@ -16,7 +16,7 @@ from collections import OrderedDict import functools import re -from typing import Dict, Sequence, Tuple, Type, Union +from typing import Dict, Optional, Sequence, Tuple, Type, Union import pkg_resources from google.api_core.client_options import ClientOptions @@ -151,6 +151,42 @@ def from_service_account_file(cls, filename: str, *args, **kwargs): from_service_account_json = from_service_account_file + @classmethod + def get_mtls_endpoint_and_cert_source( + cls, client_options: Optional[ClientOptions] = None + ): + """Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variabel is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + return ManagedIdentitiesServiceClient.get_mtls_endpoint_and_cert_source(client_options) # type: ignore + @property def transport(self) -> ManagedIdentitiesServiceTransport: """Returns the transport used by the client instance. diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py index 8477df4..4e946c4 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py @@ -277,6 +277,73 @@ def parse_common_location_path(path: str) -> Dict[str, str]: m = re.match(r"^projects/(?P.+?)/locations/(?P.+?)$", path) return m.groupdict() if m else {} + @classmethod + def get_mtls_endpoint_and_cert_source( + cls, client_options: Optional[client_options_lib.ClientOptions] = None + ): + """Return the API endpoint and client cert source for mutual TLS. + + The client cert source is determined in the following order: + (1) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is not "true", the + client cert source is None. + (2) if `client_options.client_cert_source` is provided, use the provided one; if the + default client cert source exists, use the default one; otherwise the client cert + source is None. + + The API endpoint is determined in the following order: + (1) if `client_options.api_endpoint` if provided, use the provided one. + (2) if `GOOGLE_API_USE_CLIENT_CERTIFICATE` environment variable is "always", use the + default mTLS endpoint; if the environment variabel is "never", use the default API + endpoint; otherwise if client cert source exists, use the default mTLS endpoint, otherwise + use the default API endpoint. + + More details can be found at https://google.aip.dev/auth/4114. + + Args: + client_options (google.api_core.client_options.ClientOptions): Custom options for the + client. Only the `api_endpoint` and `client_cert_source` properties may be used + in this method. + + Returns: + Tuple[str, Callable[[], Tuple[bytes, bytes]]]: returns the API endpoint and the + client cert source to use. + + Raises: + google.auth.exceptions.MutualTLSChannelError: If any errors happen. + """ + if client_options is None: + client_options = client_options_lib.ClientOptions() + use_client_cert = os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") + use_mtls_endpoint = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") + if use_client_cert not in ("true", "false"): + raise ValueError( + "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" + ) + if use_mtls_endpoint not in ("auto", "never", "always"): + raise MutualTLSChannelError( + "Environment variable `GOOGLE_API_USE_MTLS_ENDPOINT` must be `never`, `auto` or `always`" + ) + + # Figure out the client cert source to use. + client_cert_source = None + if use_client_cert == "true": + if client_options.client_cert_source: + client_cert_source = client_options.client_cert_source + elif mtls.has_default_client_cert_source(): + client_cert_source = mtls.default_client_cert_source() + + # Figure out which api endpoint to use. + if client_options.api_endpoint is not None: + api_endpoint = client_options.api_endpoint + elif use_mtls_endpoint == "always" or ( + use_mtls_endpoint == "auto" and client_cert_source + ): + api_endpoint = cls.DEFAULT_MTLS_ENDPOINT + else: + api_endpoint = cls.DEFAULT_ENDPOINT + + return api_endpoint, client_cert_source + def __init__( self, *, @@ -327,57 +394,22 @@ def __init__( if client_options is None: client_options = client_options_lib.ClientOptions() - # Create SSL credentials for mutual TLS if needed. - if os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") not in ( - "true", - "false", - ): - raise ValueError( - "Environment variable `GOOGLE_API_USE_CLIENT_CERTIFICATE` must be either `true` or `false`" - ) - use_client_cert = ( - os.getenv("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true" + api_endpoint, client_cert_source_func = self.get_mtls_endpoint_and_cert_source( + client_options ) - client_cert_source_func = None - is_mtls = False - if use_client_cert: - if client_options.client_cert_source: - is_mtls = True - client_cert_source_func = client_options.client_cert_source - else: - is_mtls = mtls.has_default_client_cert_source() - if is_mtls: - client_cert_source_func = mtls.default_client_cert_source() - else: - client_cert_source_func = None - - # Figure out which api endpoint to use. - if client_options.api_endpoint is not None: - api_endpoint = client_options.api_endpoint - else: - use_mtls_env = os.getenv("GOOGLE_API_USE_MTLS_ENDPOINT", "auto") - if use_mtls_env == "never": - api_endpoint = self.DEFAULT_ENDPOINT - elif use_mtls_env == "always": - api_endpoint = self.DEFAULT_MTLS_ENDPOINT - elif use_mtls_env == "auto": - if is_mtls: - api_endpoint = self.DEFAULT_MTLS_ENDPOINT - else: - api_endpoint = self.DEFAULT_ENDPOINT - else: - raise MutualTLSChannelError( - "Unsupported GOOGLE_API_USE_MTLS_ENDPOINT value. Accepted " - "values: never, auto, always" - ) + api_key_value = getattr(client_options, "api_key", None) + if api_key_value and credentials: + raise ValueError( + "client_options.api_key and credentials are mutually exclusive" + ) # Save or instantiate the transport. # Ordinarily, we provide the transport, but allowing a custom transport # instance provides an extensibility point for unusual situations. if isinstance(transport, ManagedIdentitiesServiceTransport): # transport is a ManagedIdentitiesServiceTransport instance. - if credentials or client_options.credentials_file: + if credentials or client_options.credentials_file or api_key_value: raise ValueError( "When providing a transport instance, " "provide its credentials directly." @@ -389,6 +421,15 @@ def __init__( ) self._transport = transport else: + import google.auth._default # type: ignore + + if api_key_value and hasattr( + google.auth._default, "get_api_key_credentials" + ): + credentials = google.auth._default.get_api_key_credentials( + api_key_value + ) + Transport = type(self).get_transport_class(transport) self._transport = Transport( credentials=credentials, diff --git a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py index 2538b30..81f4c04 100644 --- a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py +++ b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py @@ -429,6 +429,90 @@ def test_managed_identities_service_client_mtls_env_auto( ) +@pytest.mark.parametrize( + "client_class", + [ManagedIdentitiesServiceClient, ManagedIdentitiesServiceAsyncClient], +) +@mock.patch.object( + ManagedIdentitiesServiceClient, + "DEFAULT_ENDPOINT", + modify_default_endpoint(ManagedIdentitiesServiceClient), +) +@mock.patch.object( + ManagedIdentitiesServiceAsyncClient, + "DEFAULT_ENDPOINT", + modify_default_endpoint(ManagedIdentitiesServiceAsyncClient), +) +def test_managed_identities_service_client_get_mtls_endpoint_and_cert_source( + client_class, +): + mock_client_cert_source = mock.Mock() + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "true". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + mock_api_endpoint = "foo" + options = client_options.ClientOptions( + client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint + ) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source( + options + ) + assert api_endpoint == mock_api_endpoint + assert cert_source == mock_client_cert_source + + # Test the case GOOGLE_API_USE_CLIENT_CERTIFICATE is "false". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "false"}): + mock_client_cert_source = mock.Mock() + mock_api_endpoint = "foo" + options = client_options.ClientOptions( + client_cert_source=mock_client_cert_source, api_endpoint=mock_api_endpoint + ) + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source( + options + ) + assert api_endpoint == mock_api_endpoint + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "never". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "never"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "always". + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_MTLS_ENDPOINT": "always"}): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert doesn't exist. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=False, + ): + api_endpoint, cert_source = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_ENDPOINT + assert cert_source is None + + # Test the case GOOGLE_API_USE_MTLS_ENDPOINT is "auto" and default cert exists. + with mock.patch.dict(os.environ, {"GOOGLE_API_USE_CLIENT_CERTIFICATE": "true"}): + with mock.patch( + "google.auth.transport.mtls.has_default_client_cert_source", + return_value=True, + ): + with mock.patch( + "google.auth.transport.mtls.default_client_cert_source", + return_value=mock_client_cert_source, + ): + ( + api_endpoint, + cert_source, + ) = client_class.get_mtls_endpoint_and_cert_source() + assert api_endpoint == client_class.DEFAULT_MTLS_ENDPOINT + assert cert_source == mock_client_cert_source + + @pytest.mark.parametrize( "client_class,transport_class,transport_name", [ @@ -2960,6 +3044,25 @@ def test_credentials_transport_error(): transport=transport, ) + # It is an error to provide an api_key and a transport instance. + transport = transports.ManagedIdentitiesServiceGrpcTransport( + credentials=ga_credentials.AnonymousCredentials(), + ) + options = client_options.ClientOptions() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = ManagedIdentitiesServiceClient( + client_options=options, transport=transport, + ) + + # It is an error to provide an api_key and a credential. + options = mock.Mock() + options.api_key = "api_key" + with pytest.raises(ValueError): + client = ManagedIdentitiesServiceClient( + client_options=options, credentials=ga_credentials.AnonymousCredentials() + ) + # It is an error to provide scopes and a transport instance. transport = transports.ManagedIdentitiesServiceGrpcTransport( credentials=ga_credentials.AnonymousCredentials(), @@ -3567,3 +3670,39 @@ def test_client_ctx(): with client: pass close.assert_called() + + +@pytest.mark.parametrize( + "client_class,transport_class", + [ + ( + ManagedIdentitiesServiceClient, + transports.ManagedIdentitiesServiceGrpcTransport, + ), + ( + ManagedIdentitiesServiceAsyncClient, + transports.ManagedIdentitiesServiceGrpcAsyncIOTransport, + ), + ], +) +def test_api_key_credentials(client_class, transport_class): + with mock.patch.object( + google.auth._default, "get_api_key_credentials", create=True + ) as get_api_key_credentials: + mock_cred = mock.Mock() + get_api_key_credentials.return_value = mock_cred + options = client_options.ClientOptions() + options.api_key = "api_key" + with mock.patch.object(transport_class, "__init__") as patched: + patched.return_value = None + client = client_class(client_options=options) + patched.assert_called_once_with( + credentials=mock_cred, + credentials_file=None, + host=client.DEFAULT_ENDPOINT, + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + ) From ed0bec5588b9e0809d37e7902a375ce776ecdfc5 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Thu, 3 Feb 2022 11:48:54 +0000 Subject: [PATCH 11/16] chore: use gapic-generator-python 0.62.1 (#106) - [ ] Regenerate this pull request now. fix: resolve DuplicateCredentialArgs error when using credentials_file committer: parthea PiperOrigin-RevId: 425964861 Source-Link: https://github.com/googleapis/googleapis/commit/84b1a5a4f6fb2d04905be58e586b8a7a4310a8cf Source-Link: https://github.com/googleapis/googleapis-gen/commit/4fb761bbd8506ac156f49bac5f18306aa8eb3aa8 Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNGZiNzYxYmJkODUwNmFjMTU2ZjQ5YmFjNWYxODMwNmFhOGViM2FhOCJ9 --- .../async_client.py | 20 ++--- .../managed_identities_service/client.py | 20 ++--- .../transports/grpc.py | 7 +- .../transports/grpc_asyncio.py | 7 +- .../test_managed_identities_service.py | 74 ++++++++++++++++++- 5 files changed, 102 insertions(+), 26 deletions(-) diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py index 656c668..488d884 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py @@ -316,7 +316,7 @@ async def create_microsoft_ad_domain( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([parent, domain_name, domain]) if request is not None and has_flattened_params: @@ -401,7 +401,7 @@ async def reset_admin_password( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name]) if request is not None and has_flattened_params: @@ -475,7 +475,7 @@ async def list_domains( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([parent]) if request is not None and has_flattened_params: @@ -552,7 +552,7 @@ async def get_domain( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name]) if request is not None and has_flattened_params: @@ -640,7 +640,7 @@ async def update_domain( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([domain, update_mask]) if request is not None and has_flattened_params: @@ -736,7 +736,7 @@ async def delete_domain( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name]) if request is not None and has_flattened_params: @@ -825,7 +825,7 @@ async def attach_trust( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name, trust]) if request is not None and has_flattened_params: @@ -928,7 +928,7 @@ async def reconfigure_trust( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name, target_domain_name, target_dns_ip_addresses]) if request is not None and has_flattened_params: @@ -1023,7 +1023,7 @@ async def detach_trust( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name, trust]) if request is not None and has_flattened_params: @@ -1118,7 +1118,7 @@ async def validate_trust( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name, trust]) if request is not None and has_flattened_params: diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py index 4e946c4..f24ff44 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py @@ -510,7 +510,7 @@ def create_microsoft_ad_domain( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([parent, domain_name, domain]) if request is not None and has_flattened_params: @@ -599,7 +599,7 @@ def reset_admin_password( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name]) if request is not None and has_flattened_params: @@ -675,7 +675,7 @@ def list_domains( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([parent]) if request is not None and has_flattened_params: @@ -752,7 +752,7 @@ def get_domain( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name]) if request is not None and has_flattened_params: @@ -840,7 +840,7 @@ def update_domain( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([domain, update_mask]) if request is not None and has_flattened_params: @@ -936,7 +936,7 @@ def delete_domain( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name]) if request is not None and has_flattened_params: @@ -1025,7 +1025,7 @@ def attach_trust( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name, trust]) if request is not None and has_flattened_params: @@ -1128,7 +1128,7 @@ def reconfigure_trust( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name, target_domain_name, target_dns_ip_addresses]) if request is not None and has_flattened_params: @@ -1223,7 +1223,7 @@ def detach_trust( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name, trust]) if request is not None and has_flattened_params: @@ -1318,7 +1318,7 @@ def validate_trust( """ # Create or coerce a protobuf request object. - # Sanity check: If we got a request object, we should *not* have + # Quick check: If we got a request object, we should *not* have # gotten any keyword arguments that map to the request. has_flattened_params = any([name, trust]) if request is not None and has_flattened_params: diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py index 2b49366..68c8c75 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py @@ -196,8 +196,11 @@ def __init__( if not self._grpc_channel: self._grpc_channel = type(self).create_channel( self._host, + # use the credentials which are saved credentials=self._credentials, - credentials_file=credentials_file, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, scopes=self._scopes, ssl_credentials=self._ssl_channel_credentials, quota_project_id=quota_project_id, @@ -270,7 +273,7 @@ def operations_client(self) -> operations_v1.OperationsClient: This property caches on the instance; repeated calls return the same client. """ - # Sanity check: Only create a new client if we do not already have one. + # Quick check: Only create a new client if we do not already have one. if self._operations_client is None: self._operations_client = operations_v1.OperationsClient(self.grpc_channel) diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py index a8586ee..fd78892 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py @@ -241,8 +241,11 @@ def __init__( if not self._grpc_channel: self._grpc_channel = type(self).create_channel( self._host, + # use the credentials which are saved credentials=self._credentials, - credentials_file=credentials_file, + # Set ``credentials_file`` to ``None`` here as + # the credentials that we saved earlier should be used. + credentials_file=None, scopes=self._scopes, ssl_credentials=self._ssl_channel_credentials, quota_project_id=quota_project_id, @@ -272,7 +275,7 @@ def operations_client(self) -> operations_v1.OperationsAsyncClient: This property caches on the instance; repeated calls return the same client. """ - # Sanity check: Only create a new client if we do not already have one. + # Quick check: Only create a new client if we do not already have one. if self._operations_client is None: self._operations_client = operations_v1.OperationsAsyncClient( self.grpc_channel diff --git a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py index 81f4c04..a20666e 100644 --- a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py +++ b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py @@ -29,6 +29,7 @@ from google.api_core import gapic_v1 from google.api_core import grpc_helpers from google.api_core import grpc_helpers_async +from google.api_core import operation from google.api_core import operation_async # type: ignore from google.api_core import operations_v1 from google.api_core import path_template @@ -549,25 +550,28 @@ def test_managed_identities_service_client_client_options_scopes( @pytest.mark.parametrize( - "client_class,transport_class,transport_name", + "client_class,transport_class,transport_name,grpc_helpers", [ ( ManagedIdentitiesServiceClient, transports.ManagedIdentitiesServiceGrpcTransport, "grpc", + grpc_helpers, ), ( ManagedIdentitiesServiceAsyncClient, transports.ManagedIdentitiesServiceGrpcAsyncIOTransport, "grpc_asyncio", + grpc_helpers_async, ), ], ) def test_managed_identities_service_client_client_options_credentials_file( - client_class, transport_class, transport_name + client_class, transport_class, transport_name, grpc_helpers ): # Check the case credentials file is provided. options = client_options.ClientOptions(credentials_file="credentials.json") + with mock.patch.object(transport_class, "__init__") as patched: patched.return_value = None client = client_class(client_options=options, transport=transport_name) @@ -603,6 +607,72 @@ def test_managed_identities_service_client_client_options_from_dict(): ) +@pytest.mark.parametrize( + "client_class,transport_class,transport_name,grpc_helpers", + [ + ( + ManagedIdentitiesServiceClient, + transports.ManagedIdentitiesServiceGrpcTransport, + "grpc", + grpc_helpers, + ), + ( + ManagedIdentitiesServiceAsyncClient, + transports.ManagedIdentitiesServiceGrpcAsyncIOTransport, + "grpc_asyncio", + grpc_helpers_async, + ), + ], +) +def test_managed_identities_service_client_create_channel_credentials_file( + client_class, transport_class, transport_name, grpc_helpers +): + # Check the case credentials file is provided. + options = client_options.ClientOptions(credentials_file="credentials.json") + + with mock.patch.object(transport_class, "__init__") as patched: + patched.return_value = None + client = client_class(client_options=options, transport=transport_name) + patched.assert_called_once_with( + credentials=None, + credentials_file="credentials.json", + host=client.DEFAULT_ENDPOINT, + scopes=None, + client_cert_source_for_mtls=None, + quota_project_id=None, + client_info=transports.base.DEFAULT_CLIENT_INFO, + always_use_jwt_access=True, + ) + + # test that the credentials from file are saved and used as the credentials. + with mock.patch.object( + google.auth, "load_credentials_from_file", autospec=True + ) as load_creds, mock.patch.object( + google.auth, "default", autospec=True + ) as adc, mock.patch.object( + grpc_helpers, "create_channel" + ) as create_channel: + creds = ga_credentials.AnonymousCredentials() + file_creds = ga_credentials.AnonymousCredentials() + load_creds.return_value = (file_creds, None) + adc.return_value = (creds, None) + client = client_class(client_options=options, transport=transport_name) + create_channel.assert_called_with( + "managedidentities.googleapis.com:443", + credentials=file_creds, + credentials_file=None, + quota_project_id=None, + default_scopes=("https://www.googleapis.com/auth/cloud-platform",), + scopes=None, + default_host="managedidentities.googleapis.com", + ssl_credentials=None, + options=[ + ("grpc.max_send_message_length", -1), + ("grpc.max_receive_message_length", -1), + ], + ) + + @pytest.mark.parametrize( "request_type", [managed_identities_service.CreateMicrosoftAdDomainRequest, dict,] ) From 8f068a1ed5c95d8d25dee304daf11f6aa7a12891 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Fri, 11 Feb 2022 14:33:59 -0700 Subject: [PATCH 12/16] chore: use gapic-generator-python 0.63.2 (#108) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: use gapic-generator-python 0.63.2 docs: add generated snippets PiperOrigin-RevId: 427792504 Source-Link: https://github.com/googleapis/googleapis/commit/55b9e1e0b3106c850d13958352bc0751147b6b15 Source-Link: https://github.com/googleapis/googleapis-gen/commit/bf4e86b753f42cb0edb1fd51fbe840d7da0a1cde Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiYmY0ZTg2Yjc1M2Y0MmNiMGVkYjFmZDUxZmJlODQwZDdkYTBhMWNkZSJ9 * 🦉 Updates from OwlBot See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md Co-authored-by: Owl Bot --- .../async_client.py | 258 +++++ .../managed_identities_service/client.py | 268 ++++++ ...d_identities_service_attach_trust_async.py | 57 ++ ...ed_identities_service_attach_trust_sync.py | 57 ++ ...ervice_create_microsoft_ad_domain_async.py | 56 ++ ...service_create_microsoft_ad_domain_sync.py | 56 ++ ..._identities_service_delete_domain_async.py | 49 + ...d_identities_service_delete_domain_sync.py | 49 + ...d_identities_service_detach_trust_async.py | 57 ++ ...ed_identities_service_detach_trust_sync.py | 57 ++ ...ged_identities_service_get_domain_async.py | 45 + ...aged_identities_service_get_domain_sync.py | 45 + ...d_identities_service_list_domains_async.py | 46 + ...ed_identities_service_list_domains_sync.py | 46 + ...ntities_service_reconfigure_trust_async.py | 51 + ...entities_service_reconfigure_trust_sync.py | 51 + ...ties_service_reset_admin_password_async.py | 45 + ...ities_service_reset_admin_password_sync.py | 45 + ..._identities_service_update_domain_async.py | 54 ++ ...d_identities_service_update_domain_sync.py | 54 ++ ...identities_service_validate_trust_async.py | 57 ++ ..._identities_service_validate_trust_sync.py | 57 ++ ...snippet_metadata_managedidentities_v1.json | 894 ++++++++++++++++++ 23 files changed, 2454 insertions(+) create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py create mode 100644 samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py create mode 100644 samples/generated_samples/snippet_metadata_managedidentities_v1.json diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py index 488d884..be45bc4 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py @@ -263,6 +263,36 @@ async def create_microsoft_ad_domain( ) -> operation_async.AsyncOperation: r"""Creates a Microsoft AD domain. + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_create_microsoft_ad_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + domain = managedidentities_v1.Domain() + domain.name = "name_value" + domain.reserved_ip_range = "reserved_ip_range_value" + domain.locations = ['locations_value_1', 'locations_value_2'] + + request = managedidentities_v1.CreateMicrosoftAdDomainRequest( + parent="parent_value", + domain_name="domain_name_value", + domain=domain, + ) + + # Make the request + operation = client.create_microsoft_ad_domain(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.CreateMicrosoftAdDomainRequest, dict]): The request object. Request message for @@ -377,6 +407,25 @@ async def reset_admin_password( ) -> managed_identities_service.ResetAdminPasswordResponse: r"""Resets a domain's administrator password. + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_reset_admin_password(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.ResetAdminPasswordRequest( + name="name_value", + ) + + # Make the request + response = client.reset_admin_password(request=request) + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.ResetAdminPasswordRequest, dict]): The request object. Request message for @@ -448,6 +497,26 @@ async def list_domains( ) -> pagers.ListDomainsAsyncPager: r"""Lists domains in a project. + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_list_domains(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.ListDomainsRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_domains(request=request) + + # Handle the response + for response in page_result: + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.ListDomainsRequest, dict]): The request object. Request message for @@ -528,6 +597,25 @@ async def get_domain( ) -> resource.Domain: r"""Gets information about a domain. + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_get_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.GetDomainRequest( + name="name_value", + ) + + # Make the request + response = client.get_domain(request=request) + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.GetDomainRequest, dict]): The request object. Request message for @@ -600,6 +688,34 @@ async def update_domain( ) -> operation_async.AsyncOperation: r"""Updates the metadata and configuration of a domain. + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_update_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + domain = managedidentities_v1.Domain() + domain.name = "name_value" + domain.reserved_ip_range = "reserved_ip_range_value" + domain.locations = ['locations_value_1', 'locations_value_2'] + + request = managedidentities_v1.UpdateDomainRequest( + domain=domain, + ) + + # Make the request + operation = client.update_domain(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.UpdateDomainRequest, dict]): The request object. Request message for @@ -699,6 +815,29 @@ async def delete_domain( ) -> operation_async.AsyncOperation: r"""Deletes a domain. + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_delete_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.DeleteDomainRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_domain(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.DeleteDomainRequest, dict]): The request object. Request message for @@ -792,6 +931,37 @@ async def attach_trust( ) -> operation_async.AsyncOperation: r"""Adds an AD trust to a domain. + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_attach_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.AttachTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.attach_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.AttachTrustRequest, dict]): The request object. Request message for @@ -884,6 +1054,31 @@ async def reconfigure_trust( ) -> operation_async.AsyncOperation: r"""Updates the DNS conditional forwarder. + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_reconfigure_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.ReconfigureTrustRequest( + name="name_value", + target_domain_name="target_domain_name_value", + target_dns_ip_addresses=['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'], + ) + + # Make the request + operation = client.reconfigure_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.ReconfigureTrustRequest, dict]): The request object. Request message for @@ -988,6 +1183,37 @@ async def detach_trust( ) -> operation_async.AsyncOperation: r"""Removes an AD trust. + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_detach_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.DetachTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.detach_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.DetachTrustRequest, dict]): The request object. Request message for @@ -1083,6 +1309,38 @@ async def validate_trust( reachable, and that the target domain is able to accept incoming trust requests. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_validate_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.ValidateTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.validate_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.ValidateTrustRequest, dict]): The request object. Request message for diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py index f24ff44..841eb97 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py @@ -457,6 +457,37 @@ def create_microsoft_ad_domain( ) -> operation.Operation: r"""Creates a Microsoft AD domain. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_create_microsoft_ad_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + domain = managedidentities_v1.Domain() + domain.name = "name_value" + domain.reserved_ip_range = "reserved_ip_range_value" + domain.locations = ['locations_value_1', 'locations_value_2'] + + request = managedidentities_v1.CreateMicrosoftAdDomainRequest( + parent="parent_value", + domain_name="domain_name_value", + domain=domain, + ) + + # Make the request + operation = client.create_microsoft_ad_domain(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.CreateMicrosoftAdDomainRequest, dict]): The request object. Request message for @@ -575,6 +606,26 @@ def reset_admin_password( ) -> managed_identities_service.ResetAdminPasswordResponse: r"""Resets a domain's administrator password. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_reset_admin_password(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.ResetAdminPasswordRequest( + name="name_value", + ) + + # Make the request + response = client.reset_admin_password(request=request) + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.ResetAdminPasswordRequest, dict]): The request object. Request message for @@ -648,6 +699,27 @@ def list_domains( ) -> pagers.ListDomainsPager: r"""Lists domains in a project. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_list_domains(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.ListDomainsRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_domains(request=request) + + # Handle the response + for response in page_result: + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.ListDomainsRequest, dict]): The request object. Request message for @@ -728,6 +800,26 @@ def get_domain( ) -> resource.Domain: r"""Gets information about a domain. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_get_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.GetDomainRequest( + name="name_value", + ) + + # Make the request + response = client.get_domain(request=request) + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.GetDomainRequest, dict]): The request object. Request message for @@ -800,6 +892,35 @@ def update_domain( ) -> operation.Operation: r"""Updates the metadata and configuration of a domain. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_update_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + domain = managedidentities_v1.Domain() + domain.name = "name_value" + domain.reserved_ip_range = "reserved_ip_range_value" + domain.locations = ['locations_value_1', 'locations_value_2'] + + request = managedidentities_v1.UpdateDomainRequest( + domain=domain, + ) + + # Make the request + operation = client.update_domain(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.UpdateDomainRequest, dict]): The request object. Request message for @@ -899,6 +1020,30 @@ def delete_domain( ) -> operation.Operation: r"""Deletes a domain. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_delete_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.DeleteDomainRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_domain(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.DeleteDomainRequest, dict]): The request object. Request message for @@ -992,6 +1137,38 @@ def attach_trust( ) -> operation.Operation: r"""Adds an AD trust to a domain. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_attach_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.AttachTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.attach_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.AttachTrustRequest, dict]): The request object. Request message for @@ -1084,6 +1261,32 @@ def reconfigure_trust( ) -> operation.Operation: r"""Updates the DNS conditional forwarder. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_reconfigure_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.ReconfigureTrustRequest( + name="name_value", + target_domain_name="target_domain_name_value", + target_dns_ip_addresses=['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'], + ) + + # Make the request + operation = client.reconfigure_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.ReconfigureTrustRequest, dict]): The request object. Request message for @@ -1188,6 +1391,38 @@ def detach_trust( ) -> operation.Operation: r"""Removes an AD trust. + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_detach_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.DetachTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.detach_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.DetachTrustRequest, dict]): The request object. Request message for @@ -1283,6 +1518,39 @@ def validate_trust( reachable, and that the target domain is able to accept incoming trust requests. + + + .. code-block:: + + from google.cloud import managedidentities_v1 + + def sample_validate_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.ValidateTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.validate_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + Args: request (Union[google.cloud.managedidentities_v1.types.ValidateTrustRequest, dict]): The request object. Request message for diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py new file mode 100644 index 0000000..9d47767 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for AttachTrust +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_async] +from google.cloud import managedidentities_v1 + + +async def sample_attach_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.AttachTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.attach_trust(request=request) + + print("Waiting for operation to complete...") + + response = await operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py new file mode 100644 index 0000000..1c2e4c3 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for AttachTrust +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_sync] +from google.cloud import managedidentities_v1 + + +def sample_attach_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.AttachTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.attach_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py new file mode 100644 index 0000000..2aebac5 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateMicrosoftAdDomain +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_async] +from google.cloud import managedidentities_v1 + + +async def sample_create_microsoft_ad_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + domain = managedidentities_v1.Domain() + domain.name = "name_value" + domain.reserved_ip_range = "reserved_ip_range_value" + domain.locations = ['locations_value_1', 'locations_value_2'] + + request = managedidentities_v1.CreateMicrosoftAdDomainRequest( + parent="parent_value", + domain_name="domain_name_value", + domain=domain, + ) + + # Make the request + operation = client.create_microsoft_ad_domain(request=request) + + print("Waiting for operation to complete...") + + response = await operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py new file mode 100644 index 0000000..2ca543e --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for CreateMicrosoftAdDomain +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_sync] +from google.cloud import managedidentities_v1 + + +def sample_create_microsoft_ad_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + domain = managedidentities_v1.Domain() + domain.name = "name_value" + domain.reserved_ip_range = "reserved_ip_range_value" + domain.locations = ['locations_value_1', 'locations_value_2'] + + request = managedidentities_v1.CreateMicrosoftAdDomainRequest( + parent="parent_value", + domain_name="domain_name_value", + domain=domain, + ) + + # Make the request + operation = client.create_microsoft_ad_domain(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py new file mode 100644 index 0000000..f4fbaf0 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py @@ -0,0 +1,49 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDomain +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_async] +from google.cloud import managedidentities_v1 + + +async def sample_delete_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + request = managedidentities_v1.DeleteDomainRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_domain(request=request) + + print("Waiting for operation to complete...") + + response = await operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py new file mode 100644 index 0000000..316271f --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py @@ -0,0 +1,49 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DeleteDomain +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_sync] +from google.cloud import managedidentities_v1 + + +def sample_delete_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.DeleteDomainRequest( + name="name_value", + ) + + # Make the request + operation = client.delete_domain(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py new file mode 100644 index 0000000..0ae1775 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DetachTrust +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_async] +from google.cloud import managedidentities_v1 + + +async def sample_detach_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.DetachTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.detach_trust(request=request) + + print("Waiting for operation to complete...") + + response = await operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py new file mode 100644 index 0000000..cd8be88 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for DetachTrust +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_sync] +from google.cloud import managedidentities_v1 + + +def sample_detach_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.DetachTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.detach_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py new file mode 100644 index 0000000..9b14f2e --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDomain +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_async] +from google.cloud import managedidentities_v1 + + +async def sample_get_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + request = managedidentities_v1.GetDomainRequest( + name="name_value", + ) + + # Make the request + response = await client.get_domain(request=request) + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py new file mode 100644 index 0000000..82580af --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for GetDomain +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_sync] +from google.cloud import managedidentities_v1 + + +def sample_get_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.GetDomainRequest( + name="name_value", + ) + + # Make the request + response = client.get_domain(request=request) + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py new file mode 100644 index 0000000..b0aedc7 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py @@ -0,0 +1,46 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDomains +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_async] +from google.cloud import managedidentities_v1 + + +async def sample_list_domains(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + request = managedidentities_v1.ListDomainsRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_domains(request=request) + + # Handle the response + async for response in page_result: + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py new file mode 100644 index 0000000..f8822df --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py @@ -0,0 +1,46 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ListDomains +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_sync] +from google.cloud import managedidentities_v1 + + +def sample_list_domains(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.ListDomainsRequest( + parent="parent_value", + ) + + # Make the request + page_result = client.list_domains(request=request) + + # Handle the response + for response in page_result: + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py new file mode 100644 index 0000000..309f2f2 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py @@ -0,0 +1,51 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ReconfigureTrust +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_async] +from google.cloud import managedidentities_v1 + + +async def sample_reconfigure_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + request = managedidentities_v1.ReconfigureTrustRequest( + name="name_value", + target_domain_name="target_domain_name_value", + target_dns_ip_addresses=['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'], + ) + + # Make the request + operation = client.reconfigure_trust(request=request) + + print("Waiting for operation to complete...") + + response = await operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py new file mode 100644 index 0000000..f0f4f01 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py @@ -0,0 +1,51 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ReconfigureTrust +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_sync] +from google.cloud import managedidentities_v1 + + +def sample_reconfigure_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.ReconfigureTrustRequest( + name="name_value", + target_domain_name="target_domain_name_value", + target_dns_ip_addresses=['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'], + ) + + # Make the request + operation = client.reconfigure_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py new file mode 100644 index 0000000..a9da623 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ResetAdminPassword +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_async] +from google.cloud import managedidentities_v1 + + +async def sample_reset_admin_password(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + request = managedidentities_v1.ResetAdminPasswordRequest( + name="name_value", + ) + + # Make the request + response = await client.reset_admin_password(request=request) + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py new file mode 100644 index 0000000..3bff315 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py @@ -0,0 +1,45 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ResetAdminPassword +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_sync] +from google.cloud import managedidentities_v1 + + +def sample_reset_admin_password(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + request = managedidentities_v1.ResetAdminPasswordRequest( + name="name_value", + ) + + # Make the request + response = client.reset_admin_password(request=request) + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py new file mode 100644 index 0000000..fa1779b --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDomain +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_async] +from google.cloud import managedidentities_v1 + + +async def sample_update_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + domain = managedidentities_v1.Domain() + domain.name = "name_value" + domain.reserved_ip_range = "reserved_ip_range_value" + domain.locations = ['locations_value_1', 'locations_value_2'] + + request = managedidentities_v1.UpdateDomainRequest( + domain=domain, + ) + + # Make the request + operation = client.update_domain(request=request) + + print("Waiting for operation to complete...") + + response = await operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py new file mode 100644 index 0000000..92dba9e --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py @@ -0,0 +1,54 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for UpdateDomain +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_sync] +from google.cloud import managedidentities_v1 + + +def sample_update_domain(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + domain = managedidentities_v1.Domain() + domain.name = "name_value" + domain.reserved_ip_range = "reserved_ip_range_value" + domain.locations = ['locations_value_1', 'locations_value_2'] + + request = managedidentities_v1.UpdateDomainRequest( + domain=domain, + ) + + # Make the request + operation = client.update_domain(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py new file mode 100644 index 0000000..cd04e85 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ValidateTrust +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_async] +from google.cloud import managedidentities_v1 + + +async def sample_validate_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceAsyncClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.ValidateTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.validate_trust(request=request) + + print("Waiting for operation to complete...") + + response = await operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py new file mode 100644 index 0000000..3aadc42 --- /dev/null +++ b/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py @@ -0,0 +1,57 @@ +# -*- coding: utf-8 -*- +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# Generated code. DO NOT EDIT! +# +# Snippet for ValidateTrust +# NOTE: This snippet has been automatically generated for illustrative purposes only. +# It may require modifications to work in your environment. + +# To install the latest published package dependency, execute the following: +# python3 -m pip install google-cloud-managed-identities + + +# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_sync] +from google.cloud import managedidentities_v1 + + +def sample_validate_trust(): + # Create a client + client = managedidentities_v1.ManagedIdentitiesServiceClient() + + # Initialize request argument(s) + trust = managedidentities_v1.Trust() + trust.target_domain_name = "target_domain_name_value" + trust.trust_type = "EXTERNAL" + trust.trust_direction = "BIDIRECTIONAL" + trust.target_dns_ip_addresses = ['target_dns_ip_addresses_value_1', 'target_dns_ip_addresses_value_2'] + trust.trust_handshake_secret = "trust_handshake_secret_value" + + request = managedidentities_v1.ValidateTrustRequest( + name="name_value", + trust=trust, + ) + + # Make the request + operation = client.validate_trust(request=request) + + print("Waiting for operation to complete...") + + response = operation.result() + + # Handle the response + print(response) + +# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_sync] diff --git a/samples/generated_samples/snippet_metadata_managedidentities_v1.json b/samples/generated_samples/snippet_metadata_managedidentities_v1.json new file mode 100644 index 0000000..cf0181e --- /dev/null +++ b/samples/generated_samples/snippet_metadata_managedidentities_v1.json @@ -0,0 +1,894 @@ +{ + "snippets": [ + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "AttachTrust" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_async", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "AttachTrust" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_sync", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "CreateMicrosoftAdDomain" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_async", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "CreateMicrosoftAdDomain" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_sync", + "segments": [ + { + "end": 55, + "start": 27, + "type": "FULL" + }, + { + "end": 55, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 45, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 52, + "start": 46, + "type": "REQUEST_EXECUTION" + }, + { + "end": 56, + "start": 53, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "DeleteDomain" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_async", + "segments": [ + { + "end": 48, + "start": 27, + "type": "FULL" + }, + { + "end": 48, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 45, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 49, + "start": 46, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "DeleteDomain" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_sync", + "segments": [ + { + "end": 48, + "start": 27, + "type": "FULL" + }, + { + "end": 48, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 45, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 49, + "start": 46, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "DetachTrust" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_async", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "DetachTrust" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_sync", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "GetDomain" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_async", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "GetDomain" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_sync", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "ListDomains" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_async", + "segments": [ + { + "end": 45, + "start": 27, + "type": "FULL" + }, + { + "end": 45, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 46, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "ListDomains" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_sync", + "segments": [ + { + "end": 45, + "start": 27, + "type": "FULL" + }, + { + "end": 45, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 46, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "ReconfigureTrust" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_async", + "segments": [ + { + "end": 50, + "start": 27, + "type": "FULL" + }, + { + "end": 50, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 40, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 47, + "start": 41, + "type": "REQUEST_EXECUTION" + }, + { + "end": 51, + "start": 48, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "ReconfigureTrust" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_sync", + "segments": [ + { + "end": 50, + "start": 27, + "type": "FULL" + }, + { + "end": 50, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 40, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 47, + "start": 41, + "type": "REQUEST_EXECUTION" + }, + { + "end": 51, + "start": 48, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "ResetAdminPassword" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_async", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "ResetAdminPassword" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_sync", + "segments": [ + { + "end": 44, + "start": 27, + "type": "FULL" + }, + { + "end": 44, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 38, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 41, + "start": 39, + "type": "REQUEST_EXECUTION" + }, + { + "end": 45, + "start": 42, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "UpdateDomain" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_async", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 43, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 44, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "UpdateDomain" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_sync", + "segments": [ + { + "end": 53, + "start": 27, + "type": "FULL" + }, + { + "end": 53, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 43, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 50, + "start": 44, + "type": "REQUEST_EXECUTION" + }, + { + "end": 54, + "start": 51, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "async": true, + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "ValidateTrust" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_async", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ] + }, + { + "clientMethod": { + "method": { + "service": { + "shortName": "ManagedIdentitiesService" + }, + "shortName": "ValidateTrust" + } + }, + "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py", + "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_sync", + "segments": [ + { + "end": 56, + "start": 27, + "type": "FULL" + }, + { + "end": 56, + "start": 27, + "type": "SHORT" + }, + { + "end": 33, + "start": 31, + "type": "CLIENT_INITIALIZATION" + }, + { + "end": 46, + "start": 34, + "type": "REQUEST_INITIALIZATION" + }, + { + "end": 53, + "start": 47, + "type": "REQUEST_EXECUTION" + }, + { + "end": 57, + "start": 54, + "type": "RESPONSE_HANDLING" + } + ] + } + ] +} From 8d9270668ae4f9ee090d84559e45f6ba4d1756eb Mon Sep 17 00:00:00 2001 From: Bu Sun Kim <8822365+busunkim96@users.noreply.github.com> Date: Tue, 15 Feb 2022 09:40:48 -0700 Subject: [PATCH 13/16] fix(deps): remove unused dependency libcst (#109) --- setup.py | 1 - testing/constraints-3.6.txt | 1 - 2 files changed, 2 deletions(-) diff --git a/setup.py b/setup.py index f90f30d..eafad10 100644 --- a/setup.py +++ b/setup.py @@ -29,7 +29,6 @@ # Until this issue is closed # https://github.com/googleapis/google-cloud-python/issues/10566 "google-api-core[grpc] >= 1.28.0, <3.0.0dev", - "libcst >= 0.2.5", "proto-plus >= 1.4.0", ] diff --git a/testing/constraints-3.6.txt b/testing/constraints-3.6.txt index 2aef716..8fad4fc 100644 --- a/testing/constraints-3.6.txt +++ b/testing/constraints-3.6.txt @@ -20,5 +20,4 @@ # e.g., if setup.py has "foo >= 1.14.0, < 2.0.0dev", # Then this file should have foo==1.14.0 google-api-core==1.28.0 -libcst==0.2.5 proto-plus==1.4.0 From c5fafcc08c473742b1b385628b6f79db8e578e2b Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Fri, 25 Feb 2022 10:35:53 -0700 Subject: [PATCH 14/16] chore: use gapic-generator-python 0.63.4 (#110) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: use gapic-generator-python 0.63.4 chore: fix snippet region tag format chore: fix docstring code block formatting PiperOrigin-RevId: 430730865 Source-Link: https://github.com/googleapis/googleapis/commit/ea5800229f73f94fd7204915a86ed09dcddf429a Source-Link: https://github.com/googleapis/googleapis-gen/commit/ca893ff8af25fc7fe001de1405a517d80446ecca Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiY2E4OTNmZjhhZjI1ZmM3ZmUwMDFkZTE0MDVhNTE3ZDgwNDQ2ZWNjYSJ9 * 🦉 Updates from OwlBot post-processor See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md * 🦉 Updates from OwlBot post-processor See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md * chore: delete duplicates Co-authored-by: Owl Bot Co-authored-by: Bu Sun Kim <8822365+busunkim96@users.noreply.github.com> --- .../async_client.py | 20 ++--- .../managed_identities_service/client.py | 30 +++---- ..._identities_service_attach_trust_async.py} | 4 +- ...d_identities_service_attach_trust_sync.py} | 4 +- ...rvice_create_microsoft_ad_domain_async.py} | 4 +- ...ervice_create_microsoft_ad_domain_sync.py} | 4 +- ...identities_service_delete_domain_async.py} | 4 +- ..._identities_service_delete_domain_sync.py} | 4 +- ..._identities_service_detach_trust_async.py} | 4 +- ...d_identities_service_detach_trust_sync.py} | 4 +- ...ed_identities_service_get_domain_async.py} | 4 +- ...ged_identities_service_get_domain_sync.py} | 4 +- ..._identities_service_list_domains_async.py} | 4 +- ...d_identities_service_list_domains_sync.py} | 4 +- ...tities_service_reconfigure_trust_async.py} | 4 +- ...ntities_service_reconfigure_trust_sync.py} | 4 +- ...ies_service_reset_admin_password_async.py} | 4 +- ...ties_service_reset_admin_password_sync.py} | 4 +- ...identities_service_update_domain_async.py} | 4 +- ..._identities_service_update_domain_sync.py} | 4 +- ...dentities_service_validate_trust_async.py} | 4 +- ...identities_service_validate_trust_sync.py} | 4 +- ...snippet_metadata_managedidentities_v1.json | 80 +++++++++---------- 23 files changed, 100 insertions(+), 110 deletions(-) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py => managedidentities_v1_generated_managed_identities_service_attach_trust_async.py} (90%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py => managedidentities_v1_generated_managed_identities_service_attach_trust_sync.py} (90%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py => managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_async.py} (88%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py => managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_sync.py} (88%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py => managedidentities_v1_generated_managed_identities_service_delete_domain_async.py} (87%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py => managedidentities_v1_generated_managed_identities_service_delete_domain_sync.py} (87%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py => managedidentities_v1_generated_managed_identities_service_detach_trust_async.py} (90%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py => managedidentities_v1_generated_managed_identities_service_detach_trust_sync.py} (90%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py => managedidentities_v1_generated_managed_identities_service_get_domain_async.py} (87%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py => managedidentities_v1_generated_managed_identities_service_get_domain_sync.py} (87%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py => managedidentities_v1_generated_managed_identities_service_list_domains_async.py} (87%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py => managedidentities_v1_generated_managed_identities_service_list_domains_sync.py} (87%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py => managedidentities_v1_generated_managed_identities_service_reconfigure_trust_async.py} (88%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py => managedidentities_v1_generated_managed_identities_service_reconfigure_trust_sync.py} (88%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py => managedidentities_v1_generated_managed_identities_service_reset_admin_password_async.py} (86%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py => managedidentities_v1_generated_managed_identities_service_reset_admin_password_sync.py} (86%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py => managedidentities_v1_generated_managed_identities_service_update_domain_async.py} (89%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py => managedidentities_v1_generated_managed_identities_service_update_domain_sync.py} (89%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py => managedidentities_v1_generated_managed_identities_service_validate_trust_async.py} (89%) rename samples/generated_samples/{managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py => managedidentities_v1_generated_managed_identities_service_validate_trust_sync.py} (89%) diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py index be45bc4..2f8a21a 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py @@ -263,7 +263,7 @@ async def create_microsoft_ad_domain( ) -> operation_async.AsyncOperation: r"""Creates a Microsoft AD domain. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -407,7 +407,7 @@ async def reset_admin_password( ) -> managed_identities_service.ResetAdminPasswordResponse: r"""Resets a domain's administrator password. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -497,7 +497,7 @@ async def list_domains( ) -> pagers.ListDomainsAsyncPager: r"""Lists domains in a project. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -597,7 +597,7 @@ async def get_domain( ) -> resource.Domain: r"""Gets information about a domain. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -688,7 +688,7 @@ async def update_domain( ) -> operation_async.AsyncOperation: r"""Updates the metadata and configuration of a domain. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -815,7 +815,7 @@ async def delete_domain( ) -> operation_async.AsyncOperation: r"""Deletes a domain. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -931,7 +931,7 @@ async def attach_trust( ) -> operation_async.AsyncOperation: r"""Adds an AD trust to a domain. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -1054,7 +1054,7 @@ async def reconfigure_trust( ) -> operation_async.AsyncOperation: r"""Updates the DNS conditional forwarder. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -1183,7 +1183,7 @@ async def detach_trust( ) -> operation_async.AsyncOperation: r"""Removes an AD trust. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -1310,7 +1310,7 @@ async def validate_trust( incoming trust requests. - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py index 841eb97..54cc317 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py @@ -457,8 +457,7 @@ def create_microsoft_ad_domain( ) -> operation.Operation: r"""Creates a Microsoft AD domain. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -606,8 +605,7 @@ def reset_admin_password( ) -> managed_identities_service.ResetAdminPasswordResponse: r"""Resets a domain's administrator password. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -699,8 +697,7 @@ def list_domains( ) -> pagers.ListDomainsPager: r"""Lists domains in a project. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -800,8 +797,7 @@ def get_domain( ) -> resource.Domain: r"""Gets information about a domain. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -892,8 +888,7 @@ def update_domain( ) -> operation.Operation: r"""Updates the metadata and configuration of a domain. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -1020,8 +1015,7 @@ def delete_domain( ) -> operation.Operation: r"""Deletes a domain. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -1137,8 +1131,7 @@ def attach_trust( ) -> operation.Operation: r"""Adds an AD trust to a domain. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -1261,8 +1254,7 @@ def reconfigure_trust( ) -> operation.Operation: r"""Updates the DNS conditional forwarder. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -1391,8 +1383,7 @@ def detach_trust( ) -> operation.Operation: r"""Removes an AD trust. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 @@ -1519,8 +1510,7 @@ def validate_trust( incoming trust requests. - - .. code-block:: + .. code-block:: python from google.cloud import managedidentities_v1 diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_async.py similarity index 90% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_async.py index 9d47767..856085a 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_AttachTrust_async] from google.cloud import managedidentities_v1 @@ -54,4 +54,4 @@ async def sample_attach_trust(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_AttachTrust_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_sync.py similarity index 90% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_sync.py index 1c2e4c3..691ea15 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_AttachTrust_sync] from google.cloud import managedidentities_v1 @@ -54,4 +54,4 @@ def sample_attach_trust(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_AttachTrust_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_async.py similarity index 88% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_async.py index 2aebac5..347344c 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_CreateMicrosoftAdDomain_async] from google.cloud import managedidentities_v1 @@ -53,4 +53,4 @@ async def sample_create_microsoft_ad_domain(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_CreateMicrosoftAdDomain_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_sync.py similarity index 88% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_sync.py index 2ca543e..480e193 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_CreateMicrosoftAdDomain_sync] from google.cloud import managedidentities_v1 @@ -53,4 +53,4 @@ def sample_create_microsoft_ad_domain(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_CreateMicrosoftAdDomain_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_async.py similarity index 87% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_async.py index f4fbaf0..bf8bd8f 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_DeleteDomain_async] from google.cloud import managedidentities_v1 @@ -46,4 +46,4 @@ async def sample_delete_domain(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_DeleteDomain_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_sync.py similarity index 87% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_sync.py index 316271f..943ade6 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_DeleteDomain_sync] from google.cloud import managedidentities_v1 @@ -46,4 +46,4 @@ def sample_delete_domain(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_DeleteDomain_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_async.py similarity index 90% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_async.py index 0ae1775..1505fcc 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_DetachTrust_async] from google.cloud import managedidentities_v1 @@ -54,4 +54,4 @@ async def sample_detach_trust(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_DetachTrust_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_sync.py similarity index 90% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_sync.py index cd8be88..8b69725 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_DetachTrust_sync] from google.cloud import managedidentities_v1 @@ -54,4 +54,4 @@ def sample_detach_trust(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_DetachTrust_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_async.py similarity index 87% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_async.py index 9b14f2e..e103364 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_GetDomain_async] from google.cloud import managedidentities_v1 @@ -42,4 +42,4 @@ async def sample_get_domain(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_GetDomain_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_sync.py similarity index 87% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_sync.py index 82580af..8d5b543 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_GetDomain_sync] from google.cloud import managedidentities_v1 @@ -42,4 +42,4 @@ def sample_get_domain(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_GetDomain_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_async.py similarity index 87% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_async.py index b0aedc7..af0100a 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_ListDomains_async] from google.cloud import managedidentities_v1 @@ -43,4 +43,4 @@ async def sample_list_domains(): async for response in page_result: print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_ListDomains_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_sync.py similarity index 87% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_sync.py index f8822df..f1c775b 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_ListDomains_sync] from google.cloud import managedidentities_v1 @@ -43,4 +43,4 @@ def sample_list_domains(): for response in page_result: print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_ListDomains_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_async.py similarity index 88% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_async.py index 309f2f2..7e86b2b 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_ReconfigureTrust_async] from google.cloud import managedidentities_v1 @@ -48,4 +48,4 @@ async def sample_reconfigure_trust(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_ReconfigureTrust_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_sync.py similarity index 88% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_sync.py index f0f4f01..a049b90 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_ReconfigureTrust_sync] from google.cloud import managedidentities_v1 @@ -48,4 +48,4 @@ def sample_reconfigure_trust(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_ReconfigureTrust_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_async.py similarity index 86% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_async.py index a9da623..945c3b6 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_ResetAdminPassword_async] from google.cloud import managedidentities_v1 @@ -42,4 +42,4 @@ async def sample_reset_admin_password(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_ResetAdminPassword_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_sync.py similarity index 86% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_sync.py index 3bff315..2058ef3 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_ResetAdminPassword_sync] from google.cloud import managedidentities_v1 @@ -42,4 +42,4 @@ def sample_reset_admin_password(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_ResetAdminPassword_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_async.py similarity index 89% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_async.py index fa1779b..a2e6da5 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_UpdateDomain_async] from google.cloud import managedidentities_v1 @@ -51,4 +51,4 @@ async def sample_update_domain(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_UpdateDomain_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_sync.py similarity index 89% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_sync.py index 92dba9e..02d1c0f 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_UpdateDomain_sync] from google.cloud import managedidentities_v1 @@ -51,4 +51,4 @@ def sample_update_domain(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_UpdateDomain_sync] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_async.py similarity index 89% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_async.py index cd04e85..d65ffbd 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_async.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_async] +# [START managedidentities_v1_generated_ManagedIdentitiesService_ValidateTrust_async] from google.cloud import managedidentities_v1 @@ -54,4 +54,4 @@ async def sample_validate_trust(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_async] +# [END managedidentities_v1_generated_ManagedIdentitiesService_ValidateTrust_async] diff --git a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_sync.py similarity index 89% rename from samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py rename to samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_sync.py index 3aadc42..33cad0d 100644 --- a/samples/generated_samples/managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_sync.py @@ -23,7 +23,7 @@ # python3 -m pip install google-cloud-managed-identities -# [START managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_sync] +# [START managedidentities_v1_generated_ManagedIdentitiesService_ValidateTrust_sync] from google.cloud import managedidentities_v1 @@ -54,4 +54,4 @@ def sample_validate_trust(): # Handle the response print(response) -# [END managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_sync] +# [END managedidentities_v1_generated_ManagedIdentitiesService_ValidateTrust_sync] diff --git a/samples/generated_samples/snippet_metadata_managedidentities_v1.json b/samples/generated_samples/snippet_metadata_managedidentities_v1.json index cf0181e..ba3b4da 100644 --- a/samples/generated_samples/snippet_metadata_managedidentities_v1.json +++ b/samples/generated_samples/snippet_metadata_managedidentities_v1.json @@ -10,8 +10,8 @@ "shortName": "AttachTrust" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_async", + "file": "managedidentities_v1_generated_managed_identities_service_attach_trust_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_AttachTrust_async", "segments": [ { "end": 56, @@ -54,8 +54,8 @@ "shortName": "AttachTrust" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_attach_trust_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_AttachTrust_sync", + "file": "managedidentities_v1_generated_managed_identities_service_attach_trust_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_AttachTrust_sync", "segments": [ { "end": 56, @@ -99,8 +99,8 @@ "shortName": "CreateMicrosoftAdDomain" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_async", + "file": "managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_CreateMicrosoftAdDomain_async", "segments": [ { "end": 55, @@ -143,8 +143,8 @@ "shortName": "CreateMicrosoftAdDomain" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_create_microsoft_ad_domain_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_CreateMicrosoftAdDomain_sync", + "file": "managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_CreateMicrosoftAdDomain_sync", "segments": [ { "end": 55, @@ -188,8 +188,8 @@ "shortName": "DeleteDomain" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_async", + "file": "managedidentities_v1_generated_managed_identities_service_delete_domain_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_DeleteDomain_async", "segments": [ { "end": 48, @@ -232,8 +232,8 @@ "shortName": "DeleteDomain" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_delete_domain_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DeleteDomain_sync", + "file": "managedidentities_v1_generated_managed_identities_service_delete_domain_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_DeleteDomain_sync", "segments": [ { "end": 48, @@ -277,8 +277,8 @@ "shortName": "DetachTrust" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_async", + "file": "managedidentities_v1_generated_managed_identities_service_detach_trust_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_DetachTrust_async", "segments": [ { "end": 56, @@ -321,8 +321,8 @@ "shortName": "DetachTrust" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_detach_trust_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_DetachTrust_sync", + "file": "managedidentities_v1_generated_managed_identities_service_detach_trust_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_DetachTrust_sync", "segments": [ { "end": 56, @@ -366,8 +366,8 @@ "shortName": "GetDomain" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_async", + "file": "managedidentities_v1_generated_managed_identities_service_get_domain_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_GetDomain_async", "segments": [ { "end": 44, @@ -410,8 +410,8 @@ "shortName": "GetDomain" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_get_domain_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_GetDomain_sync", + "file": "managedidentities_v1_generated_managed_identities_service_get_domain_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_GetDomain_sync", "segments": [ { "end": 44, @@ -455,8 +455,8 @@ "shortName": "ListDomains" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_async", + "file": "managedidentities_v1_generated_managed_identities_service_list_domains_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_ListDomains_async", "segments": [ { "end": 45, @@ -499,8 +499,8 @@ "shortName": "ListDomains" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_list_domains_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ListDomains_sync", + "file": "managedidentities_v1_generated_managed_identities_service_list_domains_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_ListDomains_sync", "segments": [ { "end": 45, @@ -544,8 +544,8 @@ "shortName": "ReconfigureTrust" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_async", + "file": "managedidentities_v1_generated_managed_identities_service_reconfigure_trust_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_ReconfigureTrust_async", "segments": [ { "end": 50, @@ -588,8 +588,8 @@ "shortName": "ReconfigureTrust" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_reconfigure_trust_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ReconfigureTrust_sync", + "file": "managedidentities_v1_generated_managed_identities_service_reconfigure_trust_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_ReconfigureTrust_sync", "segments": [ { "end": 50, @@ -633,8 +633,8 @@ "shortName": "ResetAdminPassword" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_async", + "file": "managedidentities_v1_generated_managed_identities_service_reset_admin_password_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_ResetAdminPassword_async", "segments": [ { "end": 44, @@ -677,8 +677,8 @@ "shortName": "ResetAdminPassword" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_reset_admin_password_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ResetAdminPassword_sync", + "file": "managedidentities_v1_generated_managed_identities_service_reset_admin_password_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_ResetAdminPassword_sync", "segments": [ { "end": 44, @@ -722,8 +722,8 @@ "shortName": "UpdateDomain" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_async", + "file": "managedidentities_v1_generated_managed_identities_service_update_domain_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_UpdateDomain_async", "segments": [ { "end": 53, @@ -766,8 +766,8 @@ "shortName": "UpdateDomain" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_update_domain_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_UpdateDomain_sync", + "file": "managedidentities_v1_generated_managed_identities_service_update_domain_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_UpdateDomain_sync", "segments": [ { "end": 53, @@ -811,8 +811,8 @@ "shortName": "ValidateTrust" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_async.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_async", + "file": "managedidentities_v1_generated_managed_identities_service_validate_trust_async.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_ValidateTrust_async", "segments": [ { "end": 56, @@ -855,8 +855,8 @@ "shortName": "ValidateTrust" } }, - "file": "managedidentities_generated_managedidentities_v1_managed_identities_service_validate_trust_sync.py", - "regionTag": "managedidentities_generated_managedidentities_v1_ManagedIdentitiesService_ValidateTrust_sync", + "file": "managedidentities_v1_generated_managed_identities_service_validate_trust_sync.py", + "regionTag": "managedidentities_v1_generated_ManagedIdentitiesService_ValidateTrust_sync", "segments": [ { "end": 56, From cfe9bd138e4841024201fa6871e3c046ec2239c7 Mon Sep 17 00:00:00 2001 From: "gcf-owl-bot[bot]" <78513119+gcf-owl-bot[bot]@users.noreply.github.com> Date: Sat, 26 Feb 2022 05:26:36 -0500 Subject: [PATCH 15/16] chore: update copyright year to 2022 (#111) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: update copyright year to 2022 PiperOrigin-RevId: 431037888 Source-Link: https://github.com/googleapis/googleapis/commit/b3397f5febbf21dfc69b875ddabaf76bee765058 Source-Link: https://github.com/googleapis/googleapis-gen/commit/510b54e1cdefd53173984df16645081308fe897e Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNTEwYjU0ZTFjZGVmZDUzMTczOTg0ZGYxNjY0NTA4MTMwOGZlODk3ZSJ9 * 🦉 Updates from OwlBot post-processor See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md * 🦉 Updates from OwlBot post-processor See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md Co-authored-by: Owl Bot --- google/cloud/managedidentities/__init__.py | 2 +- google/cloud/managedidentities_v1/__init__.py | 2 +- google/cloud/managedidentities_v1/services/__init__.py | 2 +- .../services/managed_identities_service/__init__.py | 2 +- .../services/managed_identities_service/async_client.py | 2 +- .../services/managed_identities_service/client.py | 2 +- .../services/managed_identities_service/pagers.py | 2 +- .../services/managed_identities_service/transports/__init__.py | 2 +- .../services/managed_identities_service/transports/base.py | 2 +- .../services/managed_identities_service/transports/grpc.py | 2 +- .../managed_identities_service/transports/grpc_asyncio.py | 2 +- google/cloud/managedidentities_v1/types/__init__.py | 2 +- .../managedidentities_v1/types/managed_identities_service.py | 2 +- google/cloud/managedidentities_v1/types/resource.py | 2 +- ...1_generated_managed_identities_service_attach_trust_async.py | 2 +- ...v1_generated_managed_identities_service_attach_trust_sync.py | 2 +- ...naged_identities_service_create_microsoft_ad_domain_async.py | 2 +- ...anaged_identities_service_create_microsoft_ad_domain_sync.py | 2 +- ..._generated_managed_identities_service_delete_domain_async.py | 2 +- ...1_generated_managed_identities_service_delete_domain_sync.py | 2 +- ...1_generated_managed_identities_service_detach_trust_async.py | 2 +- ...v1_generated_managed_identities_service_detach_trust_sync.py | 2 +- ..._v1_generated_managed_identities_service_get_domain_async.py | 2 +- ...s_v1_generated_managed_identities_service_get_domain_sync.py | 2 +- ...1_generated_managed_identities_service_list_domains_async.py | 2 +- ...v1_generated_managed_identities_service_list_domains_sync.py | 2 +- ...erated_managed_identities_service_reconfigure_trust_async.py | 2 +- ...nerated_managed_identities_service_reconfigure_trust_sync.py | 2 +- ...ted_managed_identities_service_reset_admin_password_async.py | 2 +- ...ated_managed_identities_service_reset_admin_password_sync.py | 2 +- ..._generated_managed_identities_service_update_domain_async.py | 2 +- ...1_generated_managed_identities_service_update_domain_sync.py | 2 +- ...generated_managed_identities_service_validate_trust_async.py | 2 +- ..._generated_managed_identities_service_validate_trust_sync.py | 2 +- scripts/fixup_managedidentities_v1_keywords.py | 2 +- tests/__init__.py | 2 +- tests/unit/__init__.py | 2 +- tests/unit/gapic/__init__.py | 2 +- tests/unit/gapic/managedidentities_v1/__init__.py | 2 +- .../managedidentities_v1/test_managed_identities_service.py | 2 +- 40 files changed, 40 insertions(+), 40 deletions(-) diff --git a/google/cloud/managedidentities/__init__.py b/google/cloud/managedidentities/__init__.py index 3dac09f..ea0c2de 100644 --- a/google/cloud/managedidentities/__init__.py +++ b/google/cloud/managedidentities/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/__init__.py b/google/cloud/managedidentities_v1/__init__.py index 096d391..33c51d1 100644 --- a/google/cloud/managedidentities_v1/__init__.py +++ b/google/cloud/managedidentities_v1/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/services/__init__.py b/google/cloud/managedidentities_v1/services/__init__.py index 4de6597..e8e1c38 100644 --- a/google/cloud/managedidentities_v1/services/__init__.py +++ b/google/cloud/managedidentities_v1/services/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/__init__.py b/google/cloud/managedidentities_v1/services/managed_identities_service/__init__.py index ea59d4f..18307af 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/__init__.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py index 2f8a21a..726163c 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/async_client.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py index 54cc317..d8fb78d 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/client.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/client.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/pagers.py b/google/cloud/managedidentities_v1/services/managed_identities_service/pagers.py index d59f8bf..05f1413 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/pagers.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/pagers.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/__init__.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/__init__.py index 152cae7..cc5e5d6 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/__init__.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py index 93d42cd..174fc56 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/base.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py index 68c8c75..7a5a337 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py index fd78892..6e9666a 100644 --- a/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py +++ b/google/cloud/managedidentities_v1/services/managed_identities_service/transports/grpc_asyncio.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/types/__init__.py b/google/cloud/managedidentities_v1/types/__init__.py index 0ebcaff..412502e 100644 --- a/google/cloud/managedidentities_v1/types/__init__.py +++ b/google/cloud/managedidentities_v1/types/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/types/managed_identities_service.py b/google/cloud/managedidentities_v1/types/managed_identities_service.py index 1e03d05..0092a57 100644 --- a/google/cloud/managedidentities_v1/types/managed_identities_service.py +++ b/google/cloud/managedidentities_v1/types/managed_identities_service.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/google/cloud/managedidentities_v1/types/resource.py b/google/cloud/managedidentities_v1/types/resource.py index 8cf9f90..b472519 100644 --- a/google/cloud/managedidentities_v1/types/resource.py +++ b/google/cloud/managedidentities_v1/types/resource.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_async.py index 856085a..6850070 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_sync.py index 691ea15..c631c76 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_attach_trust_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_async.py index 347344c..7cd622d 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_sync.py index 480e193..ac50b78 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_create_microsoft_ad_domain_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_async.py index bf8bd8f..9381c95 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_sync.py index 943ade6..f0c2aa3 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_delete_domain_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_async.py index 1505fcc..c4418ab 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_sync.py index 8b69725..2e5c946 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_detach_trust_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_async.py index e103364..97086c1 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_sync.py index 8d5b543..fde5131 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_get_domain_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_async.py index af0100a..1847704 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_sync.py index f1c775b..5b9a6d2 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_list_domains_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_async.py index 7e86b2b..2320901 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_sync.py index a049b90..5dd1f98 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reconfigure_trust_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_async.py index 945c3b6..1c9183b 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_sync.py index 2058ef3..05b736b 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_reset_admin_password_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_async.py index a2e6da5..457f43f 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_sync.py index 02d1c0f..7f04cc2 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_update_domain_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_async.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_async.py index d65ffbd..e271e68 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_async.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_async.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_sync.py b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_sync.py index 33cad0d..7e35d35 100644 --- a/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_sync.py +++ b/samples/generated_samples/managedidentities_v1_generated_managed_identities_service_validate_trust_sync.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/scripts/fixup_managedidentities_v1_keywords.py b/scripts/fixup_managedidentities_v1_keywords.py index 6c157e9..b9190fb 100644 --- a/scripts/fixup_managedidentities_v1_keywords.py +++ b/scripts/fixup_managedidentities_v1_keywords.py @@ -1,6 +1,6 @@ #! /usr/bin/env python3 # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/tests/__init__.py b/tests/__init__.py index 4de6597..e8e1c38 100644 --- a/tests/__init__.py +++ b/tests/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/tests/unit/__init__.py b/tests/unit/__init__.py index 4de6597..e8e1c38 100644 --- a/tests/unit/__init__.py +++ b/tests/unit/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/tests/unit/gapic/__init__.py b/tests/unit/gapic/__init__.py index 4de6597..e8e1c38 100644 --- a/tests/unit/gapic/__init__.py +++ b/tests/unit/gapic/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/tests/unit/gapic/managedidentities_v1/__init__.py b/tests/unit/gapic/managedidentities_v1/__init__.py index 4de6597..e8e1c38 100644 --- a/tests/unit/gapic/managedidentities_v1/__init__.py +++ b/tests/unit/gapic/managedidentities_v1/__init__.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. diff --git a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py index a20666e..d3a0021 100644 --- a/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py +++ b/tests/unit/gapic/managedidentities_v1/test_managed_identities_service.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Copyright 2020 Google LLC +# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. From 920308f31d2deb4dbb882fce9b68f22cd72b8064 Mon Sep 17 00:00:00 2001 From: "release-please[bot]" <55107282+release-please[bot]@users.noreply.github.com> Date: Mon, 28 Feb 2022 17:36:23 -0500 Subject: [PATCH 16/16] chore(main): release 1.4.0 (#104) Co-authored-by: release-please[bot] <55107282+release-please[bot]@users.noreply.github.com> --- CHANGELOG.md | 13 +++++++++++++ setup.py | 2 +- 2 files changed, 14 insertions(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 1acbb32..03e7274 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,18 @@ # Changelog +## [1.4.0](https://github.com/googleapis/python-managed-identities/compare/v1.3.1...v1.4.0) (2022-02-26) + + +### Features + +* add api key support ([#103](https://github.com/googleapis/python-managed-identities/issues/103)) ([91b316a](https://github.com/googleapis/python-managed-identities/commit/91b316a5da34c8ecec852d811c2e7a9bd5254379)) + + +### Bug Fixes + +* **deps:** remove unused dependency libcst ([#109](https://github.com/googleapis/python-managed-identities/issues/109)) ([8d92706](https://github.com/googleapis/python-managed-identities/commit/8d9270668ae4f9ee090d84559e45f6ba4d1756eb)) +* resolve DuplicateCredentialArgs error when using credentials_file ([ed0bec5](https://github.com/googleapis/python-managed-identities/commit/ed0bec5588b9e0809d37e7902a375ce776ecdfc5)) + ### [1.3.1](https://www.github.com/googleapis/python-managed-identities/compare/v1.3.0...v1.3.1) (2021-11-01) diff --git a/setup.py b/setup.py index eafad10..7a03d37 100644 --- a/setup.py +++ b/setup.py @@ -20,7 +20,7 @@ import setuptools # type: ignore name = "google-cloud-managed-identities" -version = "1.3.1" +version = "1.4.0" description = "Managed Service for Microsoft Active Directory API client library" release_status = "Development Status :: 5 - Production/Stable" url = "https://github.com/googleapis/python-managed-identities"