Skip to content
Permalink
Browse files
chore: use gapic-generator-python 0.51.2 (#124)
- [ ] Regenerate this pull request now.

fix: add 'dict' annotation type to 'request'

Committer: @busunkim96
PiperOrigin-RevId: 398509016

Source-Link: googleapis/googleapis@b224dfa

Source-Link: https://github.com/googleapis/googleapis-gen/commit/63a1db7a38d74b9639592f521ed1daaf7299ad9a
Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiNjNhMWRiN2EzOGQ3NGI5NjM5NTkyZjUyMWVkMWRhYWY3Mjk5YWQ5YSJ9
  • Loading branch information
gcf-owl-bot[bot] committed Sep 24, 2021
1 parent df44ff4 commit 49b5c9ae54c594abf1a8158506e2a1ddb6dce67d
Show file tree
Hide file tree
Showing 10 changed files with 165 additions and 165 deletions.

Large diffs are not rendered by default.

@@ -120,7 +120,7 @@ def __init__(
**scopes_kwargs, quota_project_id=quota_project_id
)

# If the credentials is service account credentials, then always try to use self signed JWT.
# If the credentials are service account credentials, then always try to use self signed JWT.
if (
always_use_jwt_access
and isinstance(credentials, service_account.Credentials)
@@ -85,16 +85,16 @@ def __init__(
api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint.
If provided, it overrides the ``host`` argument and tries to create
a mutual TLS channel with client SSL credentials from
``client_cert_source`` or applicatin default SSL credentials.
``client_cert_source`` or application default SSL credentials.
client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]):
Deprecated. A callback to provide client SSL certificate bytes and
private key bytes, both in PEM format. It is ignored if
``api_mtls_endpoint`` is None.
ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials
for grpc channel. It is ignored if ``channel`` is provided.
for the grpc channel. It is ignored if ``channel`` is provided.
client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]):
A callback to provide client certificate bytes and private key bytes,
both in PEM format. It is used to configure mutual TLS channel. It is
both in PEM format. It is used to configure a mutual TLS channel. It is
ignored if ``channel`` or ``ssl_channel_credentials`` is provided.
quota_project_id (Optional[str]): An optional project to use for billing
and quota.
@@ -134,16 +134,16 @@ def __init__(
api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint.
If provided, it overrides the ``host`` argument and tries to create
a mutual TLS channel with client SSL credentials from
``client_cert_source`` or applicatin default SSL credentials.
``client_cert_source`` or application default SSL credentials.
client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]):
Deprecated. A callback to provide client SSL certificate bytes and
private key bytes, both in PEM format. It is ignored if
``api_mtls_endpoint`` is None.
ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials
for grpc channel. It is ignored if ``channel`` is provided.
for the grpc channel. It is ignored if ``channel`` is provided.
client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]):
A callback to provide client certificate bytes and private key bytes,
both in PEM format. It is used to configure mutual TLS channel. It is
both in PEM format. It is used to configure a mutual TLS channel. It is
ignored if ``channel`` or ``ssl_channel_credentials`` is provided.
quota_project_id (Optional[str]): An optional project to use for billing
and quota.

Large diffs are not rendered by default.

@@ -120,7 +120,7 @@ def __init__(
**scopes_kwargs, quota_project_id=quota_project_id
)

# If the credentials is service account credentials, then always try to use self signed JWT.
# If the credentials are service account credentials, then always try to use self signed JWT.
if (
always_use_jwt_access
and isinstance(credentials, service_account.Credentials)
@@ -85,16 +85,16 @@ def __init__(
api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint.
If provided, it overrides the ``host`` argument and tries to create
a mutual TLS channel with client SSL credentials from
``client_cert_source`` or applicatin default SSL credentials.
``client_cert_source`` or application default SSL credentials.
client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]):
Deprecated. A callback to provide client SSL certificate bytes and
private key bytes, both in PEM format. It is ignored if
``api_mtls_endpoint`` is None.
ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials
for grpc channel. It is ignored if ``channel`` is provided.
for the grpc channel. It is ignored if ``channel`` is provided.
client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]):
A callback to provide client certificate bytes and private key bytes,
both in PEM format. It is used to configure mutual TLS channel. It is
both in PEM format. It is used to configure a mutual TLS channel. It is
ignored if ``channel`` or ``ssl_channel_credentials`` is provided.
quota_project_id (Optional[str]): An optional project to use for billing
and quota.
@@ -134,16 +134,16 @@ def __init__(
api_mtls_endpoint (Optional[str]): Deprecated. The mutual TLS endpoint.
If provided, it overrides the ``host`` argument and tries to create
a mutual TLS channel with client SSL credentials from
``client_cert_source`` or applicatin default SSL credentials.
``client_cert_source`` or application default SSL credentials.
client_cert_source (Optional[Callable[[], Tuple[bytes, bytes]]]):
Deprecated. A callback to provide client SSL certificate bytes and
private key bytes, both in PEM format. It is ignored if
``api_mtls_endpoint`` is None.
ssl_channel_credentials (grpc.ChannelCredentials): SSL credentials
for grpc channel. It is ignored if ``channel`` is provided.
for the grpc channel. It is ignored if ``channel`` is provided.
client_cert_source_for_mtls (Optional[Callable[[], Tuple[bytes, bytes]]]):
A callback to provide client certificate bytes and private key bytes,
both in PEM format. It is used to configure mutual TLS channel. It is
both in PEM format. It is used to configure a mutual TLS channel. It is
ignored if ``channel`` or ``ssl_channel_credentials`` is provided.
quota_project_id (Optional[str]): An optional project to use for billing
and quota.
@@ -39,35 +39,35 @@ def partition(
class privatecaCallTransformer(cst.CSTTransformer):
CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata')
METHOD_TO_PARAMS: Dict[str, Tuple[str]] = {
'activate_certificate_authority': ('name', 'pem_ca_certificate', 'subordinate_config', 'request_id', ),
'create_ca_pool': ('parent', 'ca_pool_id', 'ca_pool', 'request_id', ),
'create_certificate': ('parent', 'certificate', 'certificate_id', 'request_id', 'validate_only', 'issuing_certificate_authority_id', ),
'create_certificate_authority': ('parent', 'certificate_authority_id', 'certificate_authority', 'request_id', ),
'create_certificate_template': ('parent', 'certificate_template_id', 'certificate_template', 'request_id', ),
'delete_ca_pool': ('name', 'request_id', ),
'delete_certificate_authority': ('name', 'request_id', 'ignore_active_certificates', ),
'delete_certificate_template': ('name', 'request_id', ),
'disable_certificate_authority': ('name', 'request_id', ),
'enable_certificate_authority': ('name', 'request_id', ),
'fetch_ca_certs': ('ca_pool', 'request_id', ),
'fetch_certificate_authority_csr': ('name', ),
'get_ca_pool': ('name', ),
'get_certificate': ('name', ),
'get_certificate_authority': ('name', ),
'get_certificate_revocation_list': ('name', ),
'get_certificate_template': ('name', ),
'list_ca_pools': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificate_authorities': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificate_revocation_lists': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificate_templates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'revoke_certificate': ('name', 'reason', 'request_id', ),
'undelete_certificate_authority': ('name', 'request_id', ),
'update_ca_pool': ('ca_pool', 'update_mask', 'request_id', ),
'update_certificate': ('certificate', 'update_mask', 'request_id', ),
'update_certificate_authority': ('certificate_authority', 'update_mask', 'request_id', ),
'update_certificate_revocation_list': ('certificate_revocation_list', 'update_mask', 'request_id', ),
'update_certificate_template': ('certificate_template', 'update_mask', 'request_id', ),
'activate_certificate_authority': ('name', 'pem_ca_certificate', 'subordinate_config', 'request_id', ),
'create_ca_pool': ('parent', 'ca_pool_id', 'ca_pool', 'request_id', ),
'create_certificate': ('parent', 'certificate', 'certificate_id', 'request_id', 'validate_only', 'issuing_certificate_authority_id', ),
'create_certificate_authority': ('parent', 'certificate_authority_id', 'certificate_authority', 'request_id', ),
'create_certificate_template': ('parent', 'certificate_template_id', 'certificate_template', 'request_id', ),
'delete_ca_pool': ('name', 'request_id', ),
'delete_certificate_authority': ('name', 'request_id', 'ignore_active_certificates', ),
'delete_certificate_template': ('name', 'request_id', ),
'disable_certificate_authority': ('name', 'request_id', ),
'enable_certificate_authority': ('name', 'request_id', ),
'fetch_ca_certs': ('ca_pool', 'request_id', ),
'fetch_certificate_authority_csr': ('name', ),
'get_ca_pool': ('name', ),
'get_certificate': ('name', ),
'get_certificate_authority': ('name', ),
'get_certificate_revocation_list': ('name', ),
'get_certificate_template': ('name', ),
'list_ca_pools': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificate_authorities': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificate_revocation_lists': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificate_templates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'revoke_certificate': ('name', 'reason', 'request_id', ),
'undelete_certificate_authority': ('name', 'request_id', ),
'update_ca_pool': ('ca_pool', 'update_mask', 'request_id', ),
'update_certificate': ('certificate', 'update_mask', 'request_id', ),
'update_certificate_authority': ('certificate_authority', 'update_mask', 'request_id', ),
'update_certificate_revocation_list': ('certificate_revocation_list', 'update_mask', 'request_id', ),
'update_certificate_template': ('certificate_template', 'update_mask', 'request_id', ),
}

def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode:
@@ -86,7 +86,7 @@ def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode:
return updated

kwargs, ctrl_kwargs = partition(
lambda a: not a.keyword.value in self.CTRL_PARAMS,
lambda a: a.keyword.value not in self.CTRL_PARAMS,
kwargs
)

@@ -39,26 +39,26 @@ def partition(
class privatecaCallTransformer(cst.CSTTransformer):
CTRL_PARAMS: Tuple[str] = ('retry', 'timeout', 'metadata')
METHOD_TO_PARAMS: Dict[str, Tuple[str]] = {
'activate_certificate_authority': ('name', 'pem_ca_certificate', 'subordinate_config', 'request_id', ),
'create_certificate': ('parent', 'certificate', 'certificate_id', 'request_id', ),
'create_certificate_authority': ('parent', 'certificate_authority_id', 'certificate_authority', 'request_id', ),
'disable_certificate_authority': ('name', 'request_id', ),
'enable_certificate_authority': ('name', 'request_id', ),
'fetch_certificate_authority_csr': ('name', ),
'get_certificate': ('name', ),
'get_certificate_authority': ('name', ),
'get_certificate_revocation_list': ('name', ),
'get_reusable_config': ('name', ),
'list_certificate_authorities': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificate_revocation_lists': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_reusable_configs': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'restore_certificate_authority': ('name', 'request_id', ),
'revoke_certificate': ('name', 'reason', 'request_id', ),
'schedule_delete_certificate_authority': ('name', 'request_id', ),
'update_certificate': ('certificate', 'update_mask', 'request_id', ),
'update_certificate_authority': ('certificate_authority', 'update_mask', 'request_id', ),
'update_certificate_revocation_list': ('certificate_revocation_list', 'update_mask', 'request_id', ),
'activate_certificate_authority': ('name', 'pem_ca_certificate', 'subordinate_config', 'request_id', ),
'create_certificate': ('parent', 'certificate', 'certificate_id', 'request_id', ),
'create_certificate_authority': ('parent', 'certificate_authority_id', 'certificate_authority', 'request_id', ),
'disable_certificate_authority': ('name', 'request_id', ),
'enable_certificate_authority': ('name', 'request_id', ),
'fetch_certificate_authority_csr': ('name', ),
'get_certificate': ('name', ),
'get_certificate_authority': ('name', ),
'get_certificate_revocation_list': ('name', ),
'get_reusable_config': ('name', ),
'list_certificate_authorities': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificate_revocation_lists': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_certificates': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'list_reusable_configs': ('parent', 'page_size', 'page_token', 'filter', 'order_by', ),
'restore_certificate_authority': ('name', 'request_id', ),
'revoke_certificate': ('name', 'reason', 'request_id', ),
'schedule_delete_certificate_authority': ('name', 'request_id', ),
'update_certificate': ('certificate', 'update_mask', 'request_id', ),
'update_certificate_authority': ('certificate_authority', 'update_mask', 'request_id', ),
'update_certificate_revocation_list': ('certificate_revocation_list', 'update_mask', 'request_id', ),
}

def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode:
@@ -77,7 +77,7 @@ def leave_Call(self, original: cst.Call, updated: cst.Call) -> cst.CSTNode:
return updated

kwargs, ctrl_kwargs = partition(
lambda a: not a.keyword.value in self.CTRL_PARAMS,
lambda a: a.keyword.value not in self.CTRL_PARAMS,
kwargs
)

0 comments on commit 49b5c9a

Please sign in to comment.