Skip to content
This repository has been archived by the owner on Oct 31, 2023. It is now read-only.

chore: Use gapic-generator-python 0.65.0 #7

Merged
merged 3 commits into from
Apr 12, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 1 addition & 2 deletions google/cloud/run_v2/services/revisions/async_client.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
from collections import OrderedDict
import functools
import re
from typing import Dict, Optional, Sequence, Tuple, Type, Union
from typing import Dict, Mapping, Optional, Sequence, Tuple, Type, Union
import pkg_resources

from google.api_core.client_options import ClientOptions
Expand Down Expand Up @@ -325,7 +325,6 @@ async def list_revisions(
r"""List Revisions from a given Service, or from a given
location.


.. code-block:: python

from google.cloud import run_v2
Expand Down
3 changes: 1 addition & 2 deletions google/cloud/run_v2/services/revisions/client.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
from collections import OrderedDict
import os
import re
from typing import Dict, Optional, Sequence, Tuple, Type, Union
from typing import Dict, Mapping, Optional, Sequence, Tuple, Type, Union
import pkg_resources

from google.api_core import client_options as client_options_lib
Expand Down Expand Up @@ -652,7 +652,6 @@ def list_revisions(
r"""List Revisions from a given Service, or from a given
location.


.. code-block:: python

from google.cloud import run_v2
Expand Down
5 changes: 5 additions & 0 deletions google/cloud/run_v2/services/revisions/transports/base.py
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,7 @@ def __init__(
always_use_jwt_access (Optional[bool]): Whether self signed JWT should
be used for service account credentials.
"""

# Save the hostname. Default to port 443 (HTTPS) if none is specified.
if ":" not in host:
host += ":443"
Expand Down Expand Up @@ -182,5 +183,9 @@ def delete_revision(
]:
raise NotImplementedError()

@property
def kind(self) -> str:
raise NotImplementedError()


__all__ = ("RevisionsTransport",)
4 changes: 4 additions & 0 deletions google/cloud/run_v2/services/revisions/transports/grpc.py
Original file line number Diff line number Diff line change
Expand Up @@ -326,5 +326,9 @@ def delete_revision(
def close(self):
self.grpc_channel.close()

@property
def kind(self) -> str:
return "grpc"


__all__ = ("RevisionsGrpcTransport",)
99 changes: 53 additions & 46 deletions google/cloud/run_v2/services/services/async_client.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
from collections import OrderedDict
import functools
import re
from typing import Dict, Optional, Sequence, Tuple, Type, Union
from typing import Dict, Mapping, Optional, Sequence, Tuple, Type, Union
import pkg_resources

from google.api_core.client_options import ClientOptions
Expand Down Expand Up @@ -230,7 +230,6 @@ async def create_service(
r"""Creates a new Service in a given project and
location.


.. code-block:: python

from google.cloud import run_v2
Expand Down Expand Up @@ -443,7 +442,7 @@ def sample_get_service():
maximum=10.0,
multiplier=1.3,
predicate=retries.if_exception_type(
core_exceptions.ServiceUnavailable,
core_exceptions.GoogleAPICallError,
),
deadline=10.0,
),
Expand Down Expand Up @@ -554,7 +553,7 @@ def sample_list_services():
maximum=10.0,
multiplier=1.3,
predicate=retries.if_exception_type(
core_exceptions.ServiceUnavailable,
core_exceptions.GoogleAPICallError,
),
deadline=10.0,
),
Expand Down Expand Up @@ -722,7 +721,6 @@ async def delete_service(
This will cause the Service to stop serving traffic and
will delete all revisions.


.. code-block:: python

from google.cloud import run_v2
Expand Down Expand Up @@ -839,7 +837,6 @@ async def get_iam_policy(
for the given Cloud Run Service. This result does not
include any inherited policies.


.. code-block:: python

from google.cloud import run_v2
Expand Down Expand Up @@ -871,21 +868,26 @@ def sample_get_iam_policy():

Returns:
google.iam.v1.policy_pb2.Policy:
Defines an Identity and Access Management (IAM) policy. It is used to
specify access control policies for Cloud Platform
resources.
An Identity and Access Management (IAM) policy, which specifies access
controls for Google Cloud resources.

A Policy is a collection of bindings. A binding binds
one or more members to a single role. Members can be
user accounts, service accounts, Google groups, and
domains (such as G Suite). A role is a named list of
permissions (defined by IAM or configured by users).
A binding can optionally specify a condition, which
is a logic expression that further constrains the
role binding based on attributes about the request
and/or target resource.

**JSON Example**
one or more members, or principals, to a single role.
Principals can be user accounts, service accounts,
Google groups, and domains (such as G Suite). A role
is a named list of permissions; each role can be an
IAM predefined role or a user-created custom role.

For some types of Google Cloud resources, a binding
can also specify a condition, which is a logical
expression that allows access to a resource only if
the expression evaluates to true. A condition can add
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies).

**JSON example:**

{
"bindings": [
Expand All @@ -900,17 +902,17 @@ def sample_get_iam_policy():

}, { "role":
"roles/resourcemanager.organizationViewer",
"members": ["user:eve@example.com"],
"members": [ "user:eve@example.com" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after
Sep 2020", "expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } }

]
], "etag": "BwWWja0YfJA=", "version": 3

}

**YAML Example**
**YAML example:**

bindings: - members: - user:\ mike@example.com -
group:\ admins@example.com - domain:google.com -
Expand All @@ -921,11 +923,12 @@ def sample_get_iam_policy():
condition: title: expirable access description:
Does not grant access after Sep 2020 expression:
request.time <
timestamp('2020-10-01T00:00:00.000Z')
timestamp('2020-10-01T00:00:00.000Z') etag:
BwWWja0YfJA= version: 3

For a description of IAM and its features, see the
[IAM developer's
guide](\ https://cloud.google.com/iam/docs).
[IAM
documentation](\ https://cloud.google.com/iam/docs/).

"""
# Create or coerce a protobuf request object.
Expand Down Expand Up @@ -970,7 +973,6 @@ async def set_iam_policy(
r"""Sets the IAM Access control policy for the specified
Service. Overwrites any existing policy.


.. code-block:: python

from google.cloud import run_v2
Expand Down Expand Up @@ -1002,21 +1004,26 @@ def sample_set_iam_policy():

Returns:
google.iam.v1.policy_pb2.Policy:
Defines an Identity and Access Management (IAM) policy. It is used to
specify access control policies for Cloud Platform
resources.
An Identity and Access Management (IAM) policy, which specifies access
controls for Google Cloud resources.

A Policy is a collection of bindings. A binding binds
one or more members to a single role. Members can be
user accounts, service accounts, Google groups, and
domains (such as G Suite). A role is a named list of
permissions (defined by IAM or configured by users).
A binding can optionally specify a condition, which
is a logic expression that further constrains the
role binding based on attributes about the request
and/or target resource.

**JSON Example**
one or more members, or principals, to a single role.
Principals can be user accounts, service accounts,
Google groups, and domains (such as G Suite). A role
is a named list of permissions; each role can be an
IAM predefined role or a user-created custom role.

For some types of Google Cloud resources, a binding
can also specify a condition, which is a logical
expression that allows access to a resource only if
the expression evaluates to true. A condition can add
constraints based on attributes of the request, the
resource, or both. To learn which resources support
conditions in their IAM policies, see the [IAM
documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies).

**JSON example:**

{
"bindings": [
Expand All @@ -1031,17 +1038,17 @@ def sample_set_iam_policy():

}, { "role":
"roles/resourcemanager.organizationViewer",
"members": ["user:eve@example.com"],
"members": [ "user:eve@example.com" ],
"condition": { "title": "expirable access",
"description": "Does not grant access after
Sep 2020", "expression": "request.time <
timestamp('2020-10-01T00:00:00.000Z')", } }

]
], "etag": "BwWWja0YfJA=", "version": 3

}

**YAML Example**
**YAML example:**

bindings: - members: - user:\ mike@example.com -
group:\ admins@example.com - domain:google.com -
Expand All @@ -1052,11 +1059,12 @@ def sample_set_iam_policy():
condition: title: expirable access description:
Does not grant access after Sep 2020 expression:
request.time <
timestamp('2020-10-01T00:00:00.000Z')
timestamp('2020-10-01T00:00:00.000Z') etag:
BwWWja0YfJA= version: 3

For a description of IAM and its features, see the
[IAM developer's
guide](\ https://cloud.google.com/iam/docs).
[IAM
documentation](\ https://cloud.google.com/iam/docs/).

"""
# Create or coerce a protobuf request object.
Expand Down Expand Up @@ -1103,7 +1111,6 @@ async def test_iam_permissions(
There are no permissions required for making this API
call.


.. code-block:: python

from google.cloud import run_v2
Expand Down
Loading