Skip to content
This repository was archived by the owner on Jul 6, 2023. It is now read-only.

Commit 49b5c9a

Browse files
chore: use gapic-generator-python 0.51.2 (#124)
- [ ] Regenerate this pull request now. fix: add 'dict' annotation type to 'request' Committer: @busunkim96 PiperOrigin-RevId: 398509016 Source-Link: googleapis/googleapis@b224dfa Source-Link: https://github.com/googleapis/googleapis-gen/commit/63a1db7a38d74b9639592f521ed1daaf7299ad9a Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNjNhMWRiN2EzOGQ3NGI5NjM5NTkyZjUyMWVkMWRhYWY3Mjk5YWQ5YSJ9
1 parent df44ff4 commit 49b5c9a

File tree

10 files changed

+165
-165
lines changed

10 files changed

+165
-165
lines changed

google/cloud/security/privateca_v1/services/certificate_authority_service/client.py

Lines changed: 59 additions & 59 deletions
Large diffs are not rendered by default.

google/cloud/security/privateca_v1/services/certificate_authority_service/transports/base.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ def __init__(
120120
**scopes_kwargs, quota_project_id=quota_project_id
121121
)
122122

123-
# If the credentials is service account credentials, then always try to use self signed JWT.
123+
# If the credentials are service account credentials, then always try to use self signed JWT.
124124
if (
125125
always_use_jwt_access
126126
and isinstance(credentials, service_account.Credentials)

google/cloud/security/privateca_v1/services/certificate_authority_service/transports/grpc.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -85,16 +85,16 @@ def __init__(
8585
api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint.
8686
If provided, it overrides the ``host`` argument and tries to create
8787
a mutual TLS channel with client SSL credentials from
88-
``client_cert_source`` or applicatin default SSL credentials.
88+
``client_cert_source`` or application default SSL credentials.
8989
client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]):
9090
Deprecated. A callback to provide client SSL certificate bytes and
9191
private key bytes, both in PEM format. It is ignored if
9292
``api_mtls_endpoint`` is None.
9393
ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials
94-
for grpc channel. It is ignored if ``channel`` is provided.
94+
for the grpc channel. It is ignored if ``channel`` is provided.
9595
client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]):
9696
A callback to provide client certificate bytes and private key bytes,
97-
both in PEM format. It is used to configure mutual TLS channel. It is
97+
both in PEM format. It is used to configure a mutual TLS channel. It is
9898
ignored if ``channel`` or ``ssl_channel_credentials`` is provided.
9999
quota_project_id (Optional[str]): An optional project to use for billing
100100
and quota.

google/cloud/security/privateca_v1/services/certificate_authority_service/transports/grpc_asyncio.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -134,16 +134,16 @@ def __init__(
134134
api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint.
135135
If provided, it overrides the ``host`` argument and tries to create
136136
a mutual TLS channel with client SSL credentials from
137-
``client_cert_source`` or applicatin default SSL credentials.
137+
``client_cert_source`` or application default SSL credentials.
138138
client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]):
139139
Deprecated. A callback to provide client SSL certificate bytes and
140140
private key bytes, both in PEM format. It is ignored if
141141
``api_mtls_endpoint`` is None.
142142
ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials
143-
for grpc channel. It is ignored if ``channel`` is provided.
143+
for the grpc channel. It is ignored if ``channel`` is provided.
144144
client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]):
145145
A callback to provide client certificate bytes and private key bytes,
146-
both in PEM format. It is used to configure mutual TLS channel. It is
146+
both in PEM format. It is used to configure a mutual TLS channel. It is
147147
ignored if ``channel`` or ``ssl_channel_credentials`` is provided.
148148
quota_project_id (Optional[str]): An optional project to use for billing
149149
and quota.

google/cloud/security/privateca_v1beta1/services/certificate_authority_service/client.py

Lines changed: 41 additions & 41 deletions
Large diffs are not rendered by default.

google/cloud/security/privateca_v1beta1/services/certificate_authority_service/transports/base.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ def __init__(
120120
**scopes_kwargs, quota_project_id=quota_project_id
121121
)
122122

123-
# If the credentials is service account credentials, then always try to use self signed JWT.
123+
# If the credentials are service account credentials, then always try to use self signed JWT.
124124
if (
125125
always_use_jwt_access
126126
and isinstance(credentials, service_account.Credentials)

google/cloud/security/privateca_v1beta1/services/certificate_authority_service/transports/grpc.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -85,16 +85,16 @@ def __init__(
8585
api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint.
8686
If provided, it overrides the ``host`` argument and tries to create
8787
a mutual TLS channel with client SSL credentials from
88-
``client_cert_source`` or applicatin default SSL credentials.
88+
``client_cert_source`` or application default SSL credentials.
8989
client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]):
9090
Deprecated. A callback to provide client SSL certificate bytes and
9191
private key bytes, both in PEM format. It is ignored if
9292
``api_mtls_endpoint`` is None.
9393
ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials
94-
for grpc channel. It is ignored if ``channel`` is provided.
94+
for the grpc channel. It is ignored if ``channel`` is provided.
9595
client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]):
9696
A callback to provide client certificate bytes and private key bytes,
97-
both in PEM format. It is used to configure mutual TLS channel. It is
97+
both in PEM format. It is used to configure a mutual TLS channel. It is
9898
ignored if ``channel`` or ``ssl_channel_credentials`` is provided.
9999
quota_project_id (Optional[str]): An optional project to use for billing
100100
and quota.

google/cloud/security/privateca_v1beta1/services/certificate_authority_service/transports/grpc_asyncio.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -134,16 +134,16 @@ def __init__(
134134
api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint.
135135
If provided, it overrides the ``host`` argument and tries to create
136136
a mutual TLS channel with client SSL credentials from
137-
``client_cert_source`` or applicatin default SSL credentials.
137+
``client_cert_source`` or application default SSL credentials.
138138
client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]):
139139
Deprecated. A callback to provide client SSL certificate bytes and
140140
private key bytes, both in PEM format. It is ignored if
141141
``api_mtls_endpoint`` is None.
142142
ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials
143-
for grpc channel. It is ignored if ``channel`` is provided.
143+
for the grpc channel. It is ignored if ``channel`` is provided.
144144
client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]):
145145
A callback to provide client certificate bytes and private key bytes,
146-
both in PEM format. It is used to configure mutual TLS channel. It is
146+
both in PEM format. It is used to configure a mutual TLS channel. It is
147147
ignored if ``channel`` or ``ssl_channel_credentials`` is provided.
148148
quota_project_id (Optional[str]): An optional project to use for billing
149149
and quota.

scripts/fixup_privateca_v1_keywords.py

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -39,35 +39,35 @@ def partition(
3939
class privatecaCallTransformer(cst.CSTTransformer):
4040
CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata')
4141
METHOD_TO_PARAMS: Dict[str, Tuple[str]] = {
42-
'activate_certificate_authority': ('name', 'pem_ca_certificate', 'subordinate_config', 'request_id', ),
43-
'create_ca_pool': ('parent', 'ca_pool_id', 'ca_pool', 'request_id', ),
44-
'create_certificate': ('parent', 'certificate', 'certificate_id', 'request_id', 'validate_only', 'issuing_certificate_authority_id', ),
45-
'create_certificate_authority': ('parent', 'certificate_authority_id', 'certificate_authority', 'request_id', ),
46-
'create_certificate_template': ('parent', 'certificate_template_id', 'certificate_template', 'request_id', ),
47-
'delete_ca_pool': ('name', 'request_id', ),
48-
'delete_certificate_authority': ('name', 'request_id', 'ignore_active_certificates', ),
49-
'delete_certificate_template': ('name', 'request_id', ),
50-
'disable_certificate_authority': ('name', 'request_id', ),
51-
'enable_certificate_authority': ('name', 'request_id', ),
52-
'fetch_ca_certs': ('ca_pool', 'request_id', ),
53-
'fetch_certificate_authority_csr': ('name', ),
54-
'get_ca_pool': ('name', ),
55-
'get_certificate': ('name', ),
56-
'get_certificate_authority': ('name', ),
57-
'get_certificate_revocation_list': ('name', ),
58-
'get_certificate_template': ('name', ),
59-
'list_ca_pools': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
60-
'list_certificate_authorities': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
61-
'list_certificate_revocation_lists': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
62-
'list_certificates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
63-
'list_certificate_templates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
64-
'revoke_certificate': ('name', 'reason', 'request_id', ),
65-
'undelete_certificate_authority': ('name', 'request_id', ),
66-
'update_ca_pool': ('ca_pool', 'update_mask', 'request_id', ),
67-
'update_certificate': ('certificate', 'update_mask', 'request_id', ),
68-
'update_certificate_authority': ('certificate_authority', 'update_mask', 'request_id', ),
69-
'update_certificate_revocation_list': ('certificate_revocation_list', 'update_mask', 'request_id', ),
70-
'update_certificate_template': ('certificate_template', 'update_mask', 'request_id', ),
42+
'activate_certificate_authority': ('name', 'pem_ca_certificate', 'subordinate_config', 'request_id', ),
43+
'create_ca_pool': ('parent', 'ca_pool_id', 'ca_pool', 'request_id', ),
44+
'create_certificate': ('parent', 'certificate', 'certificate_id', 'request_id', 'validate_only', 'issuing_certificate_authority_id', ),
45+
'create_certificate_authority': ('parent', 'certificate_authority_id', 'certificate_authority', 'request_id', ),
46+
'create_certificate_template': ('parent', 'certificate_template_id', 'certificate_template', 'request_id', ),
47+
'delete_ca_pool': ('name', 'request_id', ),
48+
'delete_certificate_authority': ('name', 'request_id', 'ignore_active_certificates', ),
49+
'delete_certificate_template': ('name', 'request_id', ),
50+
'disable_certificate_authority': ('name', 'request_id', ),
51+
'enable_certificate_authority': ('name', 'request_id', ),
52+
'fetch_ca_certs': ('ca_pool', 'request_id', ),
53+
'fetch_certificate_authority_csr': ('name', ),
54+
'get_ca_pool': ('name', ),
55+
'get_certificate': ('name', ),
56+
'get_certificate_authority': ('name', ),
57+
'get_certificate_revocation_list': ('name', ),
58+
'get_certificate_template': ('name', ),
59+
'list_ca_pools': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
60+
'list_certificate_authorities': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
61+
'list_certificate_revocation_lists': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
62+
'list_certificates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
63+
'list_certificate_templates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
64+
'revoke_certificate': ('name', 'reason', 'request_id', ),
65+
'undelete_certificate_authority': ('name', 'request_id', ),
66+
'update_ca_pool': ('ca_pool', 'update_mask', 'request_id', ),
67+
'update_certificate': ('certificate', 'update_mask', 'request_id', ),
68+
'update_certificate_authority': ('certificate_authority', 'update_mask', 'request_id', ),
69+
'update_certificate_revocation_list': ('certificate_revocation_list', 'update_mask', 'request_id', ),
70+
'update_certificate_template': ('certificate_template', 'update_mask', 'request_id', ),
7171
}
7272

7373
def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode:
@@ -86,7 +86,7 @@ def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode:
8686
return updated
8787

8888
kwargs, ctrl_kwargs = partition(
89-
lambda a: not a.keyword.value in self.CTRL_PARAMS,
89+
lambda a: a.keyword.value not in self.CTRL_PARAMS,
9090
kwargs
9191
)
9292

scripts/fixup_privateca_v1beta1_keywords.py

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -39,26 +39,26 @@ def partition(
3939
class privatecaCallTransformer(cst.CSTTransformer):
4040
CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata')
4141
METHOD_TO_PARAMS: Dict[str, Tuple[str]] = {
42-
'activate_certificate_authority': ('name', 'pem_ca_certificate', 'subordinate_config', 'request_id', ),
43-
'create_certificate': ('parent', 'certificate', 'certificate_id', 'request_id', ),
44-
'create_certificate_authority': ('parent', 'certificate_authority_id', 'certificate_authority', 'request_id', ),
45-
'disable_certificate_authority': ('name', 'request_id', ),
46-
'enable_certificate_authority': ('name', 'request_id', ),
47-
'fetch_certificate_authority_csr': ('name', ),
48-
'get_certificate': ('name', ),
49-
'get_certificate_authority': ('name', ),
50-
'get_certificate_revocation_list': ('name', ),
51-
'get_reusable_config': ('name', ),
52-
'list_certificate_authorities': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
53-
'list_certificate_revocation_lists': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
54-
'list_certificates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
55-
'list_reusable_configs': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
56-
'restore_certificate_authority': ('name', 'request_id', ),
57-
'revoke_certificate': ('name', 'reason', 'request_id', ),
58-
'schedule_delete_certificate_authority': ('name', 'request_id', ),
59-
'update_certificate': ('certificate', 'update_mask', 'request_id', ),
60-
'update_certificate_authority': ('certificate_authority', 'update_mask', 'request_id', ),
61-
'update_certificate_revocation_list': ('certificate_revocation_list', 'update_mask', 'request_id', ),
42+
'activate_certificate_authority': ('name', 'pem_ca_certificate', 'subordinate_config', 'request_id', ),
43+
'create_certificate': ('parent', 'certificate', 'certificate_id', 'request_id', ),
44+
'create_certificate_authority': ('parent', 'certificate_authority_id', 'certificate_authority', 'request_id', ),
45+
'disable_certificate_authority': ('name', 'request_id', ),
46+
'enable_certificate_authority': ('name', 'request_id', ),
47+
'fetch_certificate_authority_csr': ('name', ),
48+
'get_certificate': ('name', ),
49+
'get_certificate_authority': ('name', ),
50+
'get_certificate_revocation_list': ('name', ),
51+
'get_reusable_config': ('name', ),
52+
'list_certificate_authorities': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
53+
'list_certificate_revocation_lists': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
54+
'list_certificates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
55+
'list_reusable_configs': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
56+
'restore_certificate_authority': ('name', 'request_id', ),
57+
'revoke_certificate': ('name', 'reason', 'request_id', ),
58+
'schedule_delete_certificate_authority': ('name', 'request_id', ),
59+
'update_certificate': ('certificate', 'update_mask', 'request_id', ),
60+
'update_certificate_authority': ('certificate_authority', 'update_mask', 'request_id', ),
61+
'update_certificate_revocation_list': ('certificate_revocation_list', 'update_mask', 'request_id', ),
6262
}
6363

6464
def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode:
@@ -77,7 +77,7 @@ def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode:
7777
return updated
7878

7979
kwargs, ctrl_kwargs = partition(
80-
lambda a: not a.keyword.value in self.CTRL_PARAMS,
80+
lambda a: a.keyword.value not in self.CTRL_PARAMS,
8181
kwargs
8282
)
8383

0 commit comments

Comments
 (0)