Skip to content
Permalink
Browse files

feat: initial generation of secret manager

release-as: 0.1.0
  • Loading branch information
busunkim96 committed Dec 20, 2019
0 parents commit 1c193f815dcb2a2093b467576d3704e637ae0091
Showing with 10,878 additions and 0 deletions.
  1. +19 −0 .coveragerc
  2. +14 −0 .flake8
  3. +28 −0 .github/CONTRIBUTING.md
  4. +44 −0 .github/ISSUE_TEMPLATE/bug_report.md
  5. +18 −0 .github/ISSUE_TEMPLATE/feature_request.md
  6. +7 −0 .github/ISSUE_TEMPLATE/support_request.md
  7. +7 −0 .github/PULL_REQUEST_TEMPLATE.md
  8. +1 −0 .github/release-please.yml
  9. +58 −0 .gitignore
  10. +40 −0 .kokoro/build.sh
  11. +27 −0 .kokoro/continuous/common.cfg
  12. +1 −0 .kokoro/continuous/continuous.cfg
  13. +48 −0 .kokoro/docs/common.cfg
  14. +1 −0 .kokoro/docs/docs.cfg
  15. +27 −0 .kokoro/presubmit/common.cfg
  16. +1 −0 .kokoro/presubmit/presubmit.cfg
  17. +42 −0 .kokoro/publish-docs.sh
  18. +19 −0 .kokoro/release.sh
  19. +64 −0 .kokoro/release/common.cfg
  20. +1 −0 .kokoro/release/release.cfg
  21. +23 −0 .kokoro/trampoline.sh
  22. +12 −0 .repo-metadata.json
  23. +1 −0 CHANGELOG.md
  24. +44 −0 CODE_OF_CONDUCT.md
  25. +279 −0 CONTRIBUTING.rst
  26. +201 −0 LICENSE
  27. +6 −0 MANIFEST.in
  28. +75 −0 README.rst
  29. +1 −0 docs/README.rst
  30. +4 −0 docs/_static/custom.css
  31. +50 −0 docs/_templates/layout.html
  32. +1 −0 docs/changelog.md
  33. +358 −0 docs/conf.py
  34. +6 −0 docs/gapic/v1beta1/api.rst
  35. +5 −0 docs/gapic/v1beta1/types.rst
  36. +16 −0 docs/index.rst
  37. +24 −0 google/__init__.py
  38. +24 −0 google/cloud/__init__.py
  39. +25 −0 google/cloud/secretmanager.py
  40. +32 −0 google/cloud/secretmanager_v1beta1/__init__.py
  41. 0 google/cloud/secretmanager_v1beta1/gapic/__init__.py
  42. +39 −0 google/cloud/secretmanager_v1beta1/gapic/enums.py
  43. +1,449 −0 google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client.py
  44. +98 −0 google/cloud/secretmanager_v1beta1/gapic/secret_manager_service_client_config.py
  45. 0 google/cloud/secretmanager_v1beta1/gapic/transports/__init__.py
  46. +330 −0 google/cloud/secretmanager_v1beta1/gapic/transports/secret_manager_service_grpc_transport.py
  47. 0 google/cloud/secretmanager_v1beta1/proto/__init__.py
  48. +776 −0 google/cloud/secretmanager_v1beta1/proto/resources_pb2.py
  49. +17 −0 google/cloud/secretmanager_v1beta1/proto/resources_pb2_grpc.py
  50. +1,545 −0 google/cloud/secretmanager_v1beta1/proto/service_pb2.py
  51. +355 −0 google/cloud/secretmanager_v1beta1/proto/service_pb2_grpc.py
  52. +59 −0 google/cloud/secretmanager_v1beta1/types.py
  53. +155 −0 noxfile.py
  54. +5 −0 renovate.json
  55. +3 −0 setup.cfg
  56. +75 −0 setup.py
  57. +3,567 −0 synth.metadata
  58. +79 −0 synth.py
  59. +672 −0 tests/unit/gapic/v1beta1/test_secret_manager_service_client_v1beta1.py
@@ -0,0 +1,19 @@
# Generated by synthtool. DO NOT EDIT!
[run]
branch = True

[report]
fail_under = 100
show_missing = True
exclude_lines =
# Re-enable the standard pragma
pragma: NO COVER
# Ignore debug-only repr
def __repr__
# Ignore abstract methods
raise NotImplementedError
omit =
*/gapic/*.py
*/proto/*.py
*/core/*.py
*/site-packages/*.py
14 .flake8
@@ -0,0 +1,14 @@
# Generated by synthtool. DO NOT EDIT!
[flake8]
ignore = E203, E266, E501, W503
exclude =
# Exclude generated code.
**/proto/**
**/gapic/**
*_pb2.py

# Standard linting exemptions.
__pycache__,
.git,
*.pyc,
conf.py
@@ -0,0 +1,28 @@
# How to Contribute

We'd love to accept your patches and contributions to this project. There are
just a few small guidelines you need to follow.

## Contributor License Agreement

Contributions to this project must be accompanied by a Contributor License
Agreement. You (or your employer) retain the copyright to your contribution;
this simply gives us permission to use and redistribute your contributions as
part of the project. Head over to <https://cla.developers.google.com/> to see
your current agreements on file or to sign a new one.

You generally only need to submit a CLA once, so if you've already submitted one
(even if it was for a different project), you probably don't need to do it
again.

## Code reviews

All submissions, including submissions by project members, require review. We
use GitHub pull requests for this purpose. Consult
[GitHub Help](https://help.github.com/articles/about-pull-requests/) for more
information on using pull requests.

## Community Guidelines

This project follows [Google's Open Source Community
Guidelines](https://opensource.google.com/conduct/).
@@ -0,0 +1,44 @@
---
name: Bug report
about: Create a report to help us improve

---

Thanks for stopping by to let us know something could be better!

**PLEASE READ**: If you have a support contract with Google, please create an issue in the [support console](https://cloud.google.com/support/) instead of filing on GitHub. This will ensure a timely response.

Please run down the following list and make sure you've tried the usual "quick fixes":

- Search the issues already opened: https://github.com/googleapis/python-secret-manager/issues
- Search the issues on our "catch-all" repository: https://github.com/googleapis/google-cloud-python
- Search StackOverflow: http://stackoverflow.com/questions/tagged/google-cloud-platform+python

If you are still having issues, please be sure to include as much information as possible:

#### Environment details

- OS type and version:
- Python version: `python --version`
- pip version: `pip --version`
- `google-cloud-secret-manager` version: `pip show google-cloud-secret-manager`

#### Steps to reproduce

1. ?
2. ?

#### Code example

```python
# example
```

#### Stack trace
```
# example
```

Making sure to follow these steps will guarantee the quickest resolution possible.

Thanks!
@@ -0,0 +1,18 @@
---
name: Feature request
about: Suggest an idea for this library

---

Thanks for stopping by to let us know something could be better!

**PLEASE READ**: If you have a support contract with Google, please create an issue in the [support console](https://cloud.google.com/support/) instead of filing on GitHub. This will ensure a timely response.

**Is your feature request related to a problem? Please describe.**
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
**Describe the solution you'd like**
A clear and concise description of what you want to happen.
**Describe alternatives you've considered**
A clear and concise description of any alternative solutions or features you've considered.
**Additional context**
Add any other context or screenshots about the feature request here.
@@ -0,0 +1,7 @@
---
name: Support request
about: If you have a support contract with Google, please create an issue in the Google Cloud Support console.

---

**PLEASE READ**: If you have a support contract with Google, please create an issue in the [support console](https://cloud.google.com/support/) instead of filing on GitHub. This will ensure a timely response.
@@ -0,0 +1,7 @@
Thank you for opening a Pull Request! Before submitting your PR, there are a few things you can do to make sure it goes smoothly:
- [ ] Make sure to open an issue as a [bug/issue](https://github.com/googleapis/python-secret-manager/issues/new/choose) before writing your code! That way we can discuss the change, evaluate designs, and agree on the general idea
- [ ] Ensure the tests and linter pass
- [ ] Code coverage does not decrease (if any source code was changed)
- [ ] Appropriate docs were updated (if necessary)

Fixes #<issue_number_goes_here> 🦕
@@ -0,0 +1 @@
releaseType: python
@@ -0,0 +1,58 @@
*.py[cod]
*.sw[op]

# C extensions
*.so

# Packages
*.egg
*.egg-info
dist
build
eggs
parts
bin
var
sdist
develop-eggs
.installed.cfg
lib
lib64
__pycache__

# Installer logs
pip-log.txt

# Unit test / coverage reports
.coverage
.nox
.cache
.pytest_cache


# Mac
.DS_Store

# JetBrains
.idea

# VS Code
.vscode

# emacs
*~

# Built documentation
docs/_build
bigquery/docs/generated

# Virtual environment
env/
coverage.xml

# System test environment variables.
system_tests/local_test_setup

# Make sure a generated file isn't accidentally committed.
pylintrc
pylintrc.test
@@ -0,0 +1,40 @@
#!/bin/bash

# Copyright 2018 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

set -eo pipefail

cd github/python-secret-manager

# Disable buffering, so that the logs stream through.
export PYTHONUNBUFFERED=1

# Debug: show build environment
env | grep KOKORO

# Setup service account credentials.
export GOOGLE_APPLICATION_CREDENTIALS=${KOKORO_GFILE_DIR}/service-account.json

# Setup project id.
export PROJECT_ID=$(cat "${KOKORO_GFILE_DIR}/project-id.json")

# Remove old nox
python3.6 -m pip uninstall --yes --quiet nox-automation

# Install nox
python3.6 -m pip install --upgrade --quiet nox
python3.6 -m nox --version

python3.6 -m nox
@@ -0,0 +1,27 @@
# Format: //devtools/kokoro/config/proto/build.proto

# Build logs will be here
action {
define_artifacts {
regex: "**/*sponge_log.xml"
}
}

# Download trampoline resources.
gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline"

# Download resources for system tests (service account key, etc.)
gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/google-cloud-python"

# Use the trampoline script to run in docker.
build_file: "python-secret-manager/.kokoro/trampoline.sh"

# Configure the docker image for kokoro-trampoline.
env_vars: {
key: "TRAMPOLINE_IMAGE"
value: "gcr.io/cloud-devrel-kokoro-resources/python-multi"
}
env_vars: {
key: "TRAMPOLINE_BUILD_FILE"
value: "github/python-secret-manager/.kokoro/build.sh"
}
@@ -0,0 +1 @@
# Format: //devtools/kokoro/config/proto/build.proto
@@ -0,0 +1,48 @@
# Format: //devtools/kokoro/config/proto/build.proto

# Build logs will be here
action {
define_artifacts {
regex: "**/*sponge_log.xml"
}
}

# Download trampoline resources.
gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline"

# Use the trampoline script to run in docker.
build_file: "python-secret-manager/.kokoro/trampoline.sh"

# Configure the docker image for kokoro-trampoline.
env_vars: {
key: "TRAMPOLINE_IMAGE"
value: "gcr.io/cloud-devrel-kokoro-resources/python-multi"
}
env_vars: {
key: "TRAMPOLINE_BUILD_FILE"
value: "github/python-secret-manager/.kokoro/publish-docs.sh"
}

env_vars: {
key: "STAGING_BUCKET"
value: "docs-staging"
}

# Fetch the token needed for reporting release status to GitHub
before_action {
fetch_keystore {
keystore_resource {
keystore_config_id: 73713
keyname: "yoshi-automation-github-key"
}
}
}

before_action {
fetch_keystore {
keystore_resource {
keystore_config_id: 73713
keyname: "docuploader_service_account"
}
}
}
@@ -0,0 +1 @@
# Format: //devtools/kokoro/config/proto/build.proto
@@ -0,0 +1,27 @@
# Format: //devtools/kokoro/config/proto/build.proto

# Build logs will be here
action {
define_artifacts {
regex: "**/*sponge_log.xml"
}
}

# Download trampoline resources.
gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/trampoline"

# Download resources for system tests (service account key, etc.)
gfile_resources: "/bigstore/cloud-devrel-kokoro-resources/google-cloud-python"

# Use the trampoline script to run in docker.
build_file: "python-secret-manager/.kokoro/trampoline.sh"

# Configure the docker image for kokoro-trampoline.
env_vars: {
key: "TRAMPOLINE_IMAGE"
value: "gcr.io/cloud-devrel-kokoro-resources/python-multi"
}
env_vars: {
key: "TRAMPOLINE_BUILD_FILE"
value: "github/python-secret-manager/.kokoro/build.sh"
}
@@ -0,0 +1 @@
# Format: //devtools/kokoro/config/proto/build.proto

0 comments on commit 1c193f8

Please sign in to comment.
You can’t perform that action at this time.